> -----Ursprüngliche Nachricht-----
> Von: Mark Thomas [mailto:ma...@apache.org] 
> Gesendet: Freitag, 17. Juli 2015 12:33
> An: Tomcat Users List
> Betreff: Re: Question concerning mod_jk Security Fix CVE-2014-8111
> 
> On 16/07/2015 13:16, Kreuser, Peter wrote:
> > Please let me repeat my question from June 6th:
> > 
> > Why is this CVE still not addressed in "Apache Tomcat JK Connectors 
> > vulnerabilities" http://tomcat.apache.org/security-jk.html?
> > 
> > http://www.cvedetails.com/cve/CVE-2014-8111/
> 
> I'm a project committer but this is my personal view. It is not an
> official project view.
> 
> The information on that CVE was leaked by RedHat's security team when
> they broke embargoes associated with two Tomcat security vulnerabilities
> that they had been informed of in advance and in confidence. (There were
> also errors in the information they leaked about the other vulnerability
> that made it appear to be much worse than it actually is.)
> 
> To be clear, the Tomcat committers who are employed by RedHat were in no
> way responsible for the leaking of this information. The leak was
> entirely the fault of the RedHat security team.
> 
> The mod_jk releases involve producing a large number of Windows binaries
> and experience with tc-native suggests that figuring out the build
> process - even with the available documentation - will be non-trivial.
> To give you an idea of what is likely to be involved, compare the
> documented build instructions for tc-native on Windows [1] with what is
> actually required to produce a release [2].
> 
> Co-coincidently, the committers who typically handle the mod_jk releases
> are RedHat employees.
> 
> Given all the above, I personally have little desire to dedicate a large
> chunk of my time figuring out the mod_jk build process so I can clear up
> the mess created by RedHat's security team. I'm not against spending the
> time to better document the mod_jk build process (like I did for
> tc-native) but that isn't a priority for me right now.
> 
> I had hoped that, given that the mess is of RedHat's making, that RedHat
> would have directed one if its emmployees who is familiar with the
> mod_jk build process to spend the time necessary to produce a new mod_jk
> release. That hasn't happened.
> 
> I hadn't realised - until I looked into it as a result of your e-mail -
> how long it has been since RedHat leaked this confidential information.
> It is looking increasingly like one of the Tomcat committers is going to
> have to clean up RedHat's mess for them.
> 
> I'm not going to be in a position to do anything to fix this until week
> beginning 27th July but if nothing has been done by then I'll see what I
> can do.
> 
> <rant>
> If I do end up having to clear up this mess I'll be even more annoyed
> with RedHat's security team than I am already. I don't actually mind
> that much that a mistake was made. We all make mistakes and I have made
> very similar mistakes in the past. What annoys me about this - and I get
> more annoyed the longer this goes on - is that after RedHat realised
> they had leaked vulnerability information and that some of the
> information they had leaked as incorrect RedHat have not (to my knowledge):
> - publicly stated some of the leaked information was incorrect;
> - publicly corrected the errors in the information they did leak;
> - publicly apologised for leaking the information (they have apologised
> in private so this is less of an issue);
> - done anything to help clear up the mess such as directing their
> employees who are Tomcat committers to help with the various releases
> that became more urgent as a result of these leaks.
> 
> It is this last point that particularly annoys me.
> 
> It bears repeating here that the RedHat employees who are committers are
> in no way responsible for this mess. It just so happens that they are
> best placed to clean it up.
> </rant>
> 
> I know this doesn't give you the release you need but hopefully you'll
> at least have a better understanding of how we ended up where we are and
> you do have my assurance that I'll look into this (with no guarantee
> I'll be able to produce the release) in just over a week if no-one beats
> me to it.
> 
> Note you do have the option of building from trunk. I'm not aware of
> anything that needs fixing in mod_jk before the next release so the
> chances are that a build from the current trunk is going to be very
> close to a 1.2.41 release.
> 
> Mark
> 
> 
> [1] http://tomcat.apache.org/native-doc/
> [2] http://wiki.apache.org/tomcat/BuildTcNativeWin
> 
> > 
> > 
> > 
> > ---------------------------------
> > Hi,
> > 
> > could you please tell us, when the fixed mod_jk-Version 1.2.41 will be 
> > publicly available?
> > 
> > The webpage does not mention any vulnerability at all, plus no newer 
> > release than the vulnerable 1.2.40.
> > 
> > For now RedHat mentions only the fix to the source code from December 2014.
> > http://svn.apache.org/viewvc?view=revision&revision=1647017
> > 
> > Best regards.
> > 
> > Peter
> > 
> > 
>

Hi Mark,

I appreciate your open comment and that clarifies the lengthy wait. I trust 
that now the solution gets going and will be solved soonish.

I'm in no position to criticize any wrongdoing on this CVE. I only hope to find 
a clearer communication on the tomcat-security sites in the future and if THAT 
is RedHat's fault, then please clean up the process with them.

Thank You. Best regards,

Peter

PS: is that the correct position to add my response?




---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to