Author: markt
Date: Mon Nov 18 11:17:42 2024
New Revision: 1921932
URL: http://svn.apache.org/viewvc?rev=1921932&view=rev
Log:
CVE-2024-52316 and CVE-2024-52317
Modified:
tomcat/site/trunk/docs/security-10.html
tomcat/site/trunk/docs/security-11.html
tomcat/site/trunk/docs/security-9.html
tomcat/site/trunk/xdocs/security-10.xml
tomcat/site/trunk/xdocs/security-11.xml
tomcat/site/trunk/xdocs/security-9.xml
Modified: tomcat/site/trunk/docs/security-10.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Mon Nov 18 11:17:42 2024
@@ -42,7 +42,41 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in
Apache Tomcat 10.1.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed
in Apache Tomcat 10.1.8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache
Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in
Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed
in Apache Tomcat 10.1.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomc
at 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in
Apache Tomcat 10.0.23</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat
10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in
Apache Tomcat 10.0.21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in
Apache Tomcat 10.0.20</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in
Apache Tomcat 10.0.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in
Apache Tomcat 10.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache
Tomcat 10.0.7</a></li><li><a href="#Fix
ed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in
Apache Tomcat 10.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in
Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in
Apache Tomcat 10.1.19</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in
Apache Tomcat 10.1.13</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed
in Apache Tomcat 10.1.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tom
cat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in
Apache Tomcat 10.0.27</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in
Apache Tomcat 10.1.0-M17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in
Apache Tomcat 10.1.0-M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in
Apache Tomcat 10.1.0-M14</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in
Apache Tomcat 10.1.0-M10</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache
Tomcat 10.1.0-M6</a></li><li><a href="#F
ixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat
10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache
Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in
Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed
in Apache Tomcat 10.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in
Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_10.1.31"><span
class="pull-right">2024-10-09</span> Fixed in Apache Tomcat 10.1.31</h3><div
class="text">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52317"
rel="nofollow">CVE-2024-52317</a></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/146f94f87ea398fb592c7a20a5ccbef95e9dd72b">146f94f8</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 10.1.27 to 10.1.30</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316"
rel="nofollow">CVE-2024-52316</a></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/acc2f01395f895980f5d8a64573fcc1bade13369">acc2f013</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.30</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_10.1.25"><span
class="pull-right">2024-06-19</span> Fixed in Apache Tomcat 10.1.25</h3><div
class="text">
<p><strong>Important: Denial of Service</strong>
Modified: tomcat/site/trunk/docs/security-11.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Mon Nov 18 11:17:42 2024
@@ -36,7 +36,41 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache
Tomcat 11.0.0-M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in
Apache Tomcat 11.0.0-M12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in
Apache Tomcat 11.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in
Apache Tomcat 11.0.0-M3</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache
Tomcat 11.0.0-M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in
Apache Tomcat 11.0.0-M12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in
Apache Tomcat 11.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in
Apache Tomcat 11.0.0-M3</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0"><span
class="pull-right">2024-10-09</span> Fixed in Apache Tomcat 11.0.0</h3><div
class="text">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52317"
rel="nofollow">CVE-2024-52317</a></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/9e840ccacb40881c03a03b1e0746bfba7369b3bd">9e840cca</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 11.0.0-M23 to 11.0.0-M26</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316"
rel="nofollow">CVE-2024-52316</a></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/6d097a66746635df6880fe7662a792156b0eca14">6d097a66</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.0-M26</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M21"><span
class="pull-right">2024-06-18</span> Fixed in Apache Tomcat 11.0.0-M21</h3><div
class="text">
<p><strong>Important: Denial of Service</strong>
Modified: tomcat/site/trunk/docs/security-9.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Mon Nov 18 11:17:42 2024
@@ -36,7 +36,41 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache Tomcat
9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache
Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in
Apache Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed
in Apache Tomcat 9.0.81</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat
9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache
Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in
Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed
in Apache Tomcat 9.0.72</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat
9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache
Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in
Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed
in Apache Tomcat 9.0.65</
a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat
9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache
Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in
Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed
in Apache Tomcat 9.0.54</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat
9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache
Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in
Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed
in Apache Tomcat 9.0.44</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat
9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache
Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in
Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed
in Apache Tomcat 9.0.37</a
></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat
>9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache
>Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in
>Apache Tomcat 9.0.31</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat
>9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache
>Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in
>Apache Tomcat 9.0.21</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat
>9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache
>Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in
>Apache Tomcat 9.0.16</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat
>9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache
>Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in
>Apache Tomcat 9.0.9</a></
li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat
9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache
Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in
Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed
in Apache Tomcat 9.0.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in
Apache Tomcat 9.0.0.M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in
Apache Tomcat 9.0.0.M18</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in
Apache Tomcat 9.0.0.M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10"
>Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat
>9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in
>Apache Tomcat 9.0.0.M3</a></li><li><a
>href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in
>Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat
9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache
Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in
Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed
in Apache Tomcat 9.0.83</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat
9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache
Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in
Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed
in Apache Tomcat 9.0.74</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat
9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache
Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in
Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed
in Apache Tomcat 9.0.68</
a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat
9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache
Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in
Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed
in Apache Tomcat 9.0.58</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat
9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache
Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in
Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed
in Apache Tomcat 9.0.45</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat
9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed
in Apache Tomcat 9.0.38</a
></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat
>9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache
>Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in
>Apache Tomcat 9.0.35</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat
>9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache
>Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in
>Apache Tomcat 9.0.29</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat
>9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache
>Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in
>Apache Tomcat 9.0.19</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat
>9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache
>Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in
>Apache Tomcat 9.0.10</a>
</li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat
9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache
Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in
Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed
in Apache Tomcat 9.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat
9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache
Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed
in Apache Tomcat 9.0.0.M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in
Apache Tomcat 9.0.0.M18</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in
Apache Tomcat 9.0.0.M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed
in Apache Tomcat 9.0.0.M13</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in
Apache Tomcat 9.0.0.M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_9.0.96"><span
class="pull-right">2024-10-09</span> Fixed in Apache Tomcat 9.0.96</h3><div
class="text">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52317"
rel="nofollow">CVE-2024-52317</a></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/47307ee27abcdea2ee40e33897aca760083de46a">47307ee2</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 9.0.92 to 9.0.95</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316"
rel="nofollow">CVE-2024-52316</a></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/7532f9dc4a8c37ec958f79dc82c4924a6c539223">7532f9dc</a>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 9.0.0-M1 to 9.9.95</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_9.0.90"><span
class="pull-right">2024-06-19</span> Fixed in Apache Tomcat 9.0.90</h3><div
class="text">
<p><strong>Important: Denial of Service</strong>
Modified: tomcat/site/trunk/xdocs/security-10.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Mon Nov 18 11:17:42 2024
@@ -56,6 +56,42 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 10.1.31" rtext="2024-10-09">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <cve>CVE-2024-52317</cve></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="146f94f87ea398fb592c7a20a5ccbef95e9dd72b"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 10.1.27 to 10.1.30</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <cve>CVE-2024-52316</cve></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="acc2f01395f895980f5d8a64573fcc1bade13369"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.30</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 10.1.25" rtext="2024-06-19">
<p><strong>Important: Denial of Service</strong>
Modified: tomcat/site/trunk/xdocs/security-11.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Mon Nov 18 11:17:42 2024
@@ -50,6 +50,42 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 11.0.0" rtext="2024-10-09">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <cve>CVE-2024-52317</cve></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="9e840ccacb40881c03a03b1e0746bfba7369b3bd"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 11.0.0-M23 to 11.0.0-M26</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <cve>CVE-2024-52316</cve></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="6d097a66746635df6880fe7662a792156b0eca14"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.0-M26</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 11.0.0-M21" rtext="2024-06-18">
<p><strong>Important: Denial of Service</strong>
Modified: tomcat/site/trunk/xdocs/security-9.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1921932&r1=1921931&r2=1921932&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Nov 18 11:17:42 2024
@@ -50,6 +50,42 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 9.0.96" rtext="2024-10-09">
+
+ <p><strong>Important: Request and/or response mix-up</strong>
+ <cve>CVE-2024-52317</cve></p>
+
+ <p>Incorrect recycling of the request and response used by HTTP/2 requests
+ could lead to request and/or response mix-up between users.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="47307ee27abcdea2ee40e33897aca760083de46a"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 1 October 2024.
+ The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 9.0.92 to 9.0.95</p>
+
+ <p><strong>Low: Authentication Bypass</strong>
+ <cve>CVE-2024-52316</cve></p>
+
+ <p>If Tomcat was configured to use a custom Jakarta Authentication
(formerly
+ JASPIC) ServerAuthContext component which may throw an exception during
+ the authentication process without explicitly setting an HTTP status to
+ indicate failure, the authentication may not have failed, allowing the
+ user to bypass the authentication process. There are no known Jakarta
+ Authentication components that behave in this way.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="7532f9dc4a8c37ec958f79dc82c4924a6c539223"/>.</p>
+
+ <p>This issue was identified by the Tomcat Security Team on 19 September
+ 2024. The issue was made public on 18 November 2024.</p>
+
+ <p>Affects: 9.0.0-M1 to 9.9.95</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 9.0.90" rtext="2024-06-19">
<p><strong>Important: Denial of Service</strong>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]