Author: markt Date: Wed Sep 28 13:00:05 2022 New Revision: 1904322 URL: http://svn.apache.org/viewvc?rev=1904322&view=rev Log: Publish CVE-2021-43980
Modified: tomcat/site/trunk/docs/security-10.html tomcat/site/trunk/docs/security-8.html tomcat/site/trunk/docs/security-9.html tomcat/site/trunk/xdocs/security-10.xml tomcat/site/trunk/xdocs/security-8.xml tomcat/site/trunk/xdocs/security-9.xml Modified: tomcat/site/trunk/docs/security-10.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-10.html (original) +++ tomcat/site/trunk/docs/security-10.html Wed Sep 28 13:00:05 2022 @@ -36,7 +36,7 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_1 0.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apach e_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> </div><h3 id="Fixed_in_Apache_Tomcat_10.0.23"><span class="pull-right">2022-07-26</span> Fixed in Apache Tomcat 10.0.23</h3><div class="text"> <p><strong>Low: Apache Tomcat XSS in examples web application</strong> @@ -107,6 +107,58 @@ <p>Affects: 10.1.0-M1 to 10.1.0-M14</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.0.20"><span class="pull-right">1 April 2022</span> Fixed in Apache Tomcat 10.0.20</h3><div class="text"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 10.0.19 but the + release vote for the 10.0.19 release candidate did not pass. Therefore, + although users must download 10.0.20 to obtain a version that includes a + fix for these issues, version 10.0.19 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980" rel="nofollow">CVE-2021-43980</a></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/17f177eeb7df5938f67ef9ea580411b120195f13">17f177ee</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 10.0.0-M1 to 10.0.18</p> + + </div><h3 id="Fixed_in_Apache_Tomcat_10.1.0-M14"><span class="pull-right">1 April 2022</span> Fixed in Apache Tomcat 10.1.0-M14</h3><div class="text"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 10.1.0-M13 but the + release vote for the 10.1.0-M13 release candidate did not pass. Therefore, + although users must download 10.1.0-M14 to obtain a version that includes a + fix for these issues, version 10.1.0-M13 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980" rel="nofollow">CVE-2021-43980</a></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/9651b83a1d04583791525e5f0c4c9089f678d9fc">9651b83a</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 10.1.0-M1 to 10.1.0-M12</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.0.16"><span class="pull-right">20 January 2022</span> Fixed in Apache Tomcat 10.0.16</h3><div class="text"> <p><i>Note: The issue below was fixed in Apache Tomcat 10.0.15 but the Modified: tomcat/site/trunk/docs/security-8.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-8.html (original) +++ tomcat/site/trunk/docs/security-8.html Wed Sep 28 13:00:05 2022 @@ -42,7 +42,7 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat 8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache Tomcat 8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache Tomcat 8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache Tomcat 8.5.32</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache Tomcat >8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache >Tomcat 8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in >Apache Tomcat 8.0.50</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache Tomcat >8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache >Tomcat 8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in >Apache Tomcat 8.5.24</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat >8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in Apache >Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in >Apache Tomcat 8.0.45</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat >8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache >Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in >Apache Tomcat 8.5.15</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32 ">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in Apache Tomcat 8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat 8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache Tomcat 8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache Tomcat 8.0.53</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache Tomcat >8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache >Tomcat 8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in >Apache Tomcat 8.5.31</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache Tomcat >8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache >Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in >Apache Tomcat 8.0.48</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat >8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache >Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in >Apache Tomcat 8.5.23</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in Apache Tomcat >8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache >Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in >Apache Tomcat 8.0.44</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in Apache Tomcat 8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li><li><a href="#Not_a_vulnerability_in_T omcat">Not a vulnerability in Tomcat</a></li></ul> </div><h3 id="Fixed_in_Apache_Tomcat_8.5.82"><span class="pull-right">2022-08-13</span> Fixed in Apache Tomcat 8.5.82</h3><div class="text"> <p><strong>Low: Apache Tomcat XSS in examples web application</strong> @@ -78,6 +78,26 @@ <p>Affects: 8.5.38 to 8.5.78</p> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.78"><span class="pull-right">1 April 2022</span> Fixed in Apache Tomcat 8.5.78</h3><div class="text"> + + <p><strong>High: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980" rel="nofollow">CVE-2021-43980</a></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/4a00b0c0890538b9d3107eef8f2e0afadd119beb">4a00b0c0</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 8.5.0 to 8.5.77</p> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.76"><span class="pull-right">28 February 2022</span> Fixed in Apache Tomcat 8.5.76</h3><div class="text"> <p><strong>Important: Request mix-up</strong> Modified: tomcat/site/trunk/docs/security-9.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-9.html (original) +++ tomcat/site/trunk/docs/security-9.html Wed Sep 28 13:00:05 2022 @@ -36,7 +36,7 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 9.0.9</a>< /li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10 ">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 9.0.10</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat >9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache >Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in >Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed >in Apache Tomcat 9.0.2</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat >9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache >Tomcat 9.0.0.M22</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat >9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in >Apache Tomcat 9.0.0.M19</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat >9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in >Apache Tomcat 9.0.0.M17</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat >9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixe d in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> </div><h3 id="Fixed_in_Apache_Tomcat_9.0.65"><span class="pull-right">2022-07-20</span> Fixed in Apache Tomcat 9.0.65</h3><div class="text"> <p><strong>Low: Apache Tomcat XSS in examples web application</strong> @@ -72,6 +72,32 @@ <p>Affects: 9.0.13 to 9.0.62</p> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.62"><span class="pull-right">1 April 2022</span> Fixed in Apache Tomcat 9.0.62</h3><div class="text"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.61 but the + release vote for the 9.0.61 release candidate did not pass. Therefore, + although users must download 9.0.62 to obtain a version that includes a + fix for these issues, version 9.0.61 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980" rel="nofollow">CVE-2021-43980</a></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/170e0f792bd18ff031677890ba2fe50eb7a376c1">170e0f79</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 9.0.0-M1 to 9.0.60</p> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.58"><span class="pull-right">20 January 2022</span> Fixed in Apache Tomcat 9.0.58</h3><div class="text"> <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.57 but the Modified: tomcat/site/trunk/xdocs/security-10.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-10.xml (original) +++ tomcat/site/trunk/xdocs/security-10.xml Wed Sep 28 13:00:05 2022 @@ -128,6 +128,62 @@ </section> + <section name="Fixed in Apache Tomcat 10.0.20" rtext="1 April 2022"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 10.0.19 but the + release vote for the 10.0.19 release candidate did not pass. Therefore, + although users must download 10.0.20 to obtain a version that includes a + fix for these issues, version 10.0.19 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <cve>CVE-2021-43980</cve></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <hashlink hash="17f177eeb7df5938f67ef9ea580411b120195f13"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 10.0.0-M1 to 10.0.18</p> + + </section> + + <section name="Fixed in Apache Tomcat 10.1.0-M14" rtext="1 April 2022"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 10.1.0-M13 but the + release vote for the 10.1.0-M13 release candidate did not pass. Therefore, + although users must download 10.1.0-M14 to obtain a version that includes a + fix for these issues, version 10.1.0-M13 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <cve>CVE-2021-43980</cve></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <hashlink hash="9651b83a1d04583791525e5f0c4c9089f678d9fc"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 10.1.0-M1 to 10.1.0-M12</p> + + </section> + <section name="Fixed in Apache Tomcat 10.0.16" rtext="20 January 2022"> <p><i>Note: The issue below was fixed in Apache Tomcat 10.0.15 but the Modified: tomcat/site/trunk/xdocs/security-8.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-8.xml (original) +++ tomcat/site/trunk/xdocs/security-8.xml Wed Sep 28 13:00:05 2022 @@ -95,6 +95,28 @@ </section> + <section name="Fixed in Apache Tomcat 8.5.78" rtext="1 April 2022"> + + <p><strong>High: Information Disclosure</strong> + <cve>CVE-2021-43980</cve></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <hashlink hash="4a00b0c0890538b9d3107eef8f2e0afadd119beb"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 8.5.0 to 8.5.77</p> + + </section> + <section name="Fixed in Apache Tomcat 8.5.76" rtext="28 February 2022"> <p><strong>Important: Request mix-up</strong> Modified: tomcat/site/trunk/xdocs/security-9.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1904322&r1=1904321&r2=1904322&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-9.xml (original) +++ tomcat/site/trunk/xdocs/security-9.xml Wed Sep 28 13:00:05 2022 @@ -89,6 +89,34 @@ </section> + <section name="Fixed in Apache Tomcat 9.0.62" rtext="1 April 2022"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.61 but the + release vote for the 9.0.61 release candidate did not pass. Therefore, + although users must download 9.0.62 to obtain a version that includes a + fix for these issues, version 9.0.61 is not included in the list of + affected versions.</i></p> + + <p><strong>High: Information Disclosure</strong> + <cve>CVE-2021-43980</cve></p> + + <p>The simplified implementation of blocking reads and writes introduced in + Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long + standing (but extremely hard to trigger) concurrency bug that could cause + client connections to share an Http11Processor instance resulting in + responses, or part responses, to be received by the wrong client.</p> + + <p>This was fixed with commit + <hashlink hash="170e0f792bd18ff031677890ba2fe50eb7a376c1"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team by Adam + Thomas, Richard Hernandez and Ryan Schmitt on 11 November 2021. The issue + was made public on 28 September 2022.</p> + + <p>Affects: 9.0.0-M1 to 9.0.60</p> + + </section> + <section name="Fixed in Apache Tomcat 9.0.58" rtext="20 January 2022"> <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.57 but the --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org