Author: markt
Date: Wed Mar 13 15:41:32 2024
New Revision: 1916277

URL: http://svn.apache.org/viewvc?rev=1916277&view=rev
Log:
Add CVE-2024-23672 and CVE-2024-24549

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-11.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-11.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Wed Mar 13 15:41:32 2024
@@ -42,7 +42,38 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in 
Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in 
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed 
in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache 
Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in 
Apache Tomcat 10.0.27</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in 
Apache T
 omcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed 
in Apache Tomcat 10.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in 
Apache Tomcat 10.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in 
Apache Tomcat 10.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in 
Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_i
 n_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache 
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed 
in Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache 
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in 
Apache Tomcat 10.1.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache 
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in 
Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed 
in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache 
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomc
 at 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in 
Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed
 _in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 
10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.19"><span 
class="pull-right">2024-02-19</span> Fixed in Apache Tomcat 10.1.19</h3><div 
class="text">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672"; 
rel="nofollow">CVE-2024-23672</a></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501";>0052b374</a>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.18</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549"; 
rel="nofollow">CVE-2024-24549</a></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/d07c82194edb69d99b438828fe2cbfadbb207843";>d07c8219</a>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.18</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.16"><span 
class="pull-right">2023-11-14</span> Fixed in Apache Tomcat 10.1.16</h3><div 
class="text">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/docs/security-11.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Wed Mar 13 15:41:32 2024
@@ -36,7 +36,38 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache 
Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache 
Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M17"><span 
class="pull-right">2024-02-19</span> Fixed in Apache Tomcat 11.0.0-M17</h3><div 
class="text">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672"; 
rel="nofollow">CVE-2024-23672</a></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9";>b0e3b1bd</a>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.0-M16</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549"; 
rel="nofollow">CVE-2024-24549</a></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/810f49d5ff6d64b704af85d5b8d0aab9ec3c83f5";>810f49d5</a>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.0-M16</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M12"><span 
class="pull-right">2023-10-10</span> Fixed in Apache Tomcat 11.0.0-M12</h3><div 
class="text">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Wed Mar 13 15:41:32 2024
@@ -42,7 +42,38 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.96">Fixed in Apache Tomcat 
8.5.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.94">Fixed in Apache 
Tomcat 8.5.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.93">Fixed in 
Apache Tomcat 8.5.93</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.89">Fixed 
in Apache Tomcat 8.5.89</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.88">Fixed in Apache Tomcat 
8.5.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.86">Fixed in Apache 
Tomcat 8.5.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.85">Fixed in 
Apache Tomcat 8.5.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed 
in Apache Tomcat 8.5.84</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache Tomcat 
8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache 
Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in 
Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed 
in Apache Tomcat 8.5.78</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 
8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache 
Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in 
Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed 
in Apache Tomcat 8.5.68</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 
8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache 
Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in 
Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed 
in Apache Tomcat 8.5.63</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 
8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache 
Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in 
Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed 
in Apache Tomcat 8.5.56</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 
 >8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache 
 >Tomcat 8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in 
 >Apache Tomcat 8.5.50</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 
 >8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache 
 >Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in 
 >Apache Tomcat 8.5.40</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat 
 >8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache 
 >Tomcat 8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in 
 >Apache Tomcat 8.0.53</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache Tomcat 
 >8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache 
 >Tomcat 8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in 
 >Apache Tomcat 8.5.31</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache Tomcat 
8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache 
Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in 
Apache Tomcat 8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed 
in Apache Tomcat 8.5.24</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat 
8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in Apache 
Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in 
Apache Tomcat 8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed 
in Apache Tomcat 8.5.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 
8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache 
Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in 
Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed 
in Apache Tomcat 8.5.13</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 
8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache 
Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in 
Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed 
in Apache Tomcat 8.5.11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 
8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache 
Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in 
Apache Tomcat 8.5.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 
and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed 
in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 
8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache 
Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27"
 >Fixed in Apache Tomcat 8.0.27</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 
 >8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache 
 >Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in 
 >Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed 
 >in Apache Tomcat 8.0.5</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 
 >8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in 
 >Apache Tomcat 8.0.0-RC10</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 
 >8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
 >vulnerability in Tomcat</a></li><li><a 
 >href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
 >Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.99">Fixed in Apache Tomcat 
8.5.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.96">Fixed in Apache 
Tomcat 8.5.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.94">Fixed in 
Apache Tomcat 8.5.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.93">Fixed 
in Apache Tomcat 8.5.93</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.89">Fixed in Apache Tomcat 
8.5.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.88">Fixed in Apache 
Tomcat 8.5.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.86">Fixed in 
Apache Tomcat 8.5.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.85">Fixed 
in Apache Tomcat 8.5.85</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed in Apache Tomcat 
8.5.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache 
Tomcat 8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in 
Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed 
in Apache Tomcat 8.5.79</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 
8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache 
Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in 
Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed 
in Apache Tomcat 8.5.72</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 
8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache 
Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in 
Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed 
in Apache Tomcat 8.5.64</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 
8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache 
Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in 
Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed 
in Apache Tomcat 8.5.57</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 
 >8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache 
 >Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in 
 >Apache Tomcat 8.5.51</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 
 >8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache 
 >Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in 
 >Apache Tomcat 8.5.41</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 
 >8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache 
 >Tomcat 8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in 
 >Apache Tomcat 8.5.34</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache Tomcat 
 >8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache 
 >Tomcat 8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in 
 >Apache Tomcat 8.0.52</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache Tomcat 
8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache 
Tomcat 8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in 
Apache Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed 
in Apache Tomcat 8.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat 
8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache 
Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in 
Apache Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed 
in Apache Tomcat 8.0.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 
8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache 
Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in 
Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed 
in Apache Tomcat 8.0.43</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 
8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache 
Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in 
Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed 
in Apache Tomcat 8.0.41</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 
8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache 
Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in 
Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed 
in Apache Tomcat 8.5.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 
and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed 
in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 
8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30"
 >Fixed in Apache Tomcat 8.0.30</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 
 >8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache 
 >Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in 
 >Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed 
 >in Apache Tomcat 8.0.8</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 
 >8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache 
 >Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed 
 >in Apache Tomcat 8.0.0-RC10</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 
 >8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
 >vulnerability in Tomcat</a></li><li><a 
 >href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
 >Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_8.5.99"><span 
class="pull-right">2024-02-19</span> Fixed in Apache Tomcat 8.5.99</h3><div 
class="text">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672"; 
rel="nofollow">CVE-2024-23672</a></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591";>3631adb1</a>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 8.5.0 to 8.5.98</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549"; 
rel="nofollow">CVE-2024-24549</a></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/0cac540a882220231ba7a82330483cbd5f6b1f96";>0cac540a</a>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 8.5.0 to 8.5.98</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_8.5.96"><span 
class="pull-right">2023-11-13</span> Fixed in Apache Tomcat 8.5.96</h3><div 
class="text">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Wed Mar 13 15:41:32 2024
@@ -36,7 +36,38 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache Tomcat 
9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache 
Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in 
Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed 
in Apache Tomcat 9.0.75</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 
9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache 
Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in 
Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed 
in Apache Tomcat 9.0.69</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache 
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in 
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed 
in Apache Tomcat 9.0.62</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache 
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in 
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed 
in Apache Tomcat 9.0.46</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache 
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in 
Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed 
in Apache Tomcat 9.0.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache 
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in 
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed 
in Apache Tomcat 9.0.35</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 
 >9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache 
 >Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in 
 >Apache Tomcat 9.0.29</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 
 >9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache 
 >Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in 
 >Apache Tomcat 9.0.19</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 
 >9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache 
 >Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in 
 >Apache Tomcat 9.0.10</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 
 >9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache 
 >Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in 
 >Apache Tomcat 9.0.5</a></li><
 li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 
9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache 
Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in 
Apache Tomcat 9.0.0.M22</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in 
Apache Tomcat 9.0.0.M19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 
9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in 
Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_
 9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in Apache Tomcat 9.0.71</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache 
Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in 
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed 
in Apache Tomcat 9.0.63</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache 
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in 
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed 
in Apache Tomcat 9.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache 
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in 
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed 
in Apache Tomcat 9.0.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 
9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache 
Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in 
Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed 
in Apache Tomcat 9.0.36</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 
 >9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache 
 >Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in 
 >Apache Tomcat 9.0.30</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 
 >9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache 
 >Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in 
 >Apache Tomcat 9.0.20</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 
 >9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache 
 >Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in 
 >Apache Tomcat 9.0.12</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 
 >9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache 
 >Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in 
 >Apache Tomcat 9.0.8</a></li
 ><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
 >9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
 >Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
 >Apache Tomcat 9.0.1</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
 >9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
 >Apache Tomcat 9.0.0.M21</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
 >9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
 >Apache Tomcat 9.0.0.M18</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
 >9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
 >Apache Tomcat 9.0.0.M15</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
 >9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
 >Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.
 0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.86"><span 
class="pull-right">2024-02-19</span> Fixed in Apache Tomcat 9.0.86</h3><div 
class="text">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672"; 
rel="nofollow">CVE-2024-23672</a></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068";>52d6650e</a>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 9.0.0-M1 to 9.0.85</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549"; 
rel="nofollow">CVE-2024-24549</a></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/8e03be9f2698f2da9027d40b9e9c0c9429b74dc0";>8e03be9f</a>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 9.0.0-M1 to 9.0.85</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.83"><span 
class="pull-right">2023-11-15</span> Fixed in Apache Tomcat 9.0.83</h3><div 
class="text">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Wed Mar 13 15:41:32 2024
@@ -56,6 +56,39 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.19" rtext="2024-02-19">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-23672</cve></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="0052b374684b613b0c849899b325ebe334ac6501"/>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.18</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-24549</cve></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <hashlink hash="d07c82194edb69d99b438828fe2cbfadbb207843"/>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.18</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.16" rtext="2023-11-14">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/xdocs/security-11.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Wed Mar 13 15:41:32 2024
@@ -50,6 +50,39 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.0-M17" rtext="2024-02-19">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-23672</cve></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="b0e3b1bd78de270d53e319d7cb79eb282aa53cb9"/>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.0-M16</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-24549</cve></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <hashlink hash="810f49d5ff6d64b704af85d5b8d0aab9ec3c83f5"/>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.0-M16</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.0-M12" rtext="2023-10-10">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Wed Mar 13 15:41:32 2024
@@ -56,6 +56,39 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.5.99" rtext="2024-02-19">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-23672</cve></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="3631adb1342d8bbd8598802a12b63ad02c37d591"/>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 8.5.0 to 8.5.98</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-24549</cve></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <hashlink hash="0cac540a882220231ba7a82330483cbd5f6b1f96"/>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 8.5.0 to 8.5.98</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 8.5.96" rtext="2023-11-13">
 
     <p><strong>Important: Request smuggling</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1916277&r1=1916276&r2=1916277&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Wed Mar 13 15:41:32 2024
@@ -50,6 +50,39 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.86" rtext="2024-02-19">
+  
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-23672</cve></p>
+
+    <p>It was possible for a WebSocket client to keep a WebSocket connection
+       open leading to increased resource consumption.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="52d6650e062d880704898d7d8c1b2b7a3efe8068"/>.</p>
+
+    <p>This issue was identified by the Tomcat Security Team on 17 January 
2024.
+       The issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 9.0.0-M1 to 9.0.85</p>
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2024-24549</cve></p>
+
+    <p>When processing an HTTP/2 request, if the request exceeded any of the
+       configured limits for headers, the associated HTTP/2 stream was not 
reset
+       until after all of the headers had been processed.</p>
+       
+    <p>This was fixed with commit
+       <hashlink hash="8e03be9f2698f2da9027d40b9e9c0c9429b74dc0"/>.</p>
+
+    <p>This issue was reported to the Tomcat Security Team on 24 January 2024. 
The
+       issue was made public on 13 March 2024.</p>
+
+    <p>Affects: 9.0.0-M1 to 9.0.85</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.83" rtext="2023-11-15">
 
     <p><strong>Important: Request smuggling</strong>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org


Reply via email to