Author: markt
Date: Mon Feb  9 09:12:45 2015
New Revision: 1658333

URL: http://svn.apache.org/r1658333
Log:
Add information on CVE-2014-0227

Modified:
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/xdocs/security-6.xml
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Mon Feb  9 09:12:45 2015
@@ -200,6 +200,9 @@
 <a href="#Apache_Tomcat_6.x_vulnerabilities">Apache Tomcat 6.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_6.0.43">Fixed in Apache Tomcat 6.0.43</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_6.0.41">Fixed in Apache Tomcat 6.0.41</a>
 </li>
 <li>
@@ -303,6 +306,41 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_6.0.43">
+<span style="float: right;">22 November 2014</span> Fixed in Apache Tomcat 
6.0.43</h3>
+<div class="text">
+
+  
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat 6.0.42 but the
+       release vote for the 6.0.42 release candidate did not pass.
+       Therefore, although users must download 6.0.43 to obtain a version that
+       includes a fix for this issue, version 6.0.42 is not
+       included in the list of affected versions.</i>
+</p>
+ 
+    
+<p>
+<strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227"; 
rel="nofollow">CVE-2014-0227</a>
+</p>
+
+    
+<p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1603628";>1603628</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    
+<p>Affects: 6.0.0 to 6.0.41</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_6.0.41">
 <span style="float: right;">released 23 May 2014</span> Fixed in Apache Tomcat 
6.0.41</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Mon Feb  9 09:12:45 2015
@@ -200,6 +200,9 @@
 <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.55">Fixed in Apache Tomcat 7.0.55</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_7.0.54">Fixed in Apache Tomcat 7.0.54</a>
 </li>
 <li>
@@ -320,6 +323,32 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.55">
+<span style="float: right;">27 July 2014</span> Fixed in Apache Tomcat 
7.0.55</h3>
+<div class="text">
+
+    
+<p>
+<strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227"; 
rel="nofollow">CVE-2014-0227</a>
+</p>
+
+    
+<p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1601333";>1601333</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.54</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_7.0.54">
 <span style="float: right;">released 22 May 2014</span> Fixed in Apache Tomcat 
7.0.54</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Mon Feb  9 09:12:45 2015
@@ -200,6 +200,9 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 8.0.9</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a>
 </li>
 <li>
@@ -266,6 +269,33 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.9">
+<span style="float: right;">24 June 2014</span> Fixed in Apache Tomcat 
8.0.9</h3>
+<div class="text">
+
+    
+<p>
+<strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227"; 
rel="nofollow">CVE-2014-0227</a>
+</p>
+
+    
+<p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1600984";>1600984</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1601332";>1601332</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    
+<p>Affects: 8.0.0-RC1 to 8.0.8</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.0.8">
 <span style="float: right;">beta, 21 May 2014</span> Fixed in Apache Tomcat 
8.0.8</h3>
 <div class="text">

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Mon Feb  9 09:12:45 2015
@@ -48,6 +48,29 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 6.0.43" rtext="22 November 2014">
+
+  <p><i>Note: The issue below was fixed in Apache Tomcat 6.0.42 but the
+       release vote for the 6.0.42 release candidate did not pass.
+       Therefore, although users must download 6.0.43 to obtain a version that
+       includes a fix for this issue, version 6.0.42 is not
+       included in the list of affected versions.</i></p>
+ 
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2014-0227</cve></p>
+
+    <p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    <p>This was fixed in revision <revlink rev="1603628">1603628</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    <p>Affects: 6.0.0 to 6.0.41</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 6.0.41" rtext="released 23 May 2014">
 
   <p><i>Note: The issues below were fixed in Apache Tomcat 6.0.40 but the

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Mon Feb  9 09:12:45 2015
@@ -50,6 +50,23 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.55" rtext="27 July 2014">
+
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2014-0227</cve></p>
+
+    <p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    <p>This was fixed in revision <revlink rev="1601333">1601333</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    <p>Affects: 7.0.0 to 7.0.54</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 7.0.54" rtext="released 22 May 2014">
 
     <p><strong>Low: Information Disclosure</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1658333&r1=1658332&r2=1658333&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Mon Feb  9 09:12:45 2015
@@ -50,6 +50,24 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.0.9" rtext="24 June 2014">
+
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2014-0227</cve></p>
+
+    <p>It was possible to craft a malformed chunk as part of a chucked request
+       that caused Tomcat to read part of the request body as a new 
request.</p>
+
+    <p>This was fixed in revisions <revlink rev="1600984">1600984</revlink> and
+       <revlink rev="1601332">1601332</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 30 May 2014
+       and made public on 9 February 2015.</p>
+
+    <p>Affects: 8.0.0-RC1 to 8.0.8</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 8.0.8" rtext="beta, 21 May 2014">
 
   <p><i>Note: The issue below was fixed in Apache Tomcat 8.0.6 but the



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to