Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 915568 (CVE-2023-42794, CVE-2023-42795, CVE-2023-45648) - <www-servers/tomcat-{8.5.94,9.0.81,10.1.14}: Multiple vulnerabilities
Summary: <www-servers/tomcat-{8.5.94,9.0.81,10.1.14}: Multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2023-42794, CVE-2023-42795, CVE-2023-45648
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa?]
Keywords:
Depends on: 915578
Blocks: CVE-2023-44487
  Show dependency tree
 
Reported: 2023-10-11 06:05 UTC by Hans de Graaff
Modified: 2023-10-30 00:10 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hans de Graaff gentoo-dev Security 2023-10-11 06:05:09 UTC
Important: Request smuggling CVE-2023-45648

Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy.

This was fixed with commit 8ecff306.

This issue was reported to the Tomcat Security Team on 12 September 2023. The issue was made public on 10 October 2023.

Affects: 10.1.0-M1 to 10.1.13

Important: Denial of Service CVE-2023-44487

Tomcat's HTTP/2 implementation was vulnerable to the rapid reset attack. The denial of service typically manifested as an OutOfMemoryError.

This was fixed with commit 76bb4bfb.

This issue was reported to the Tomcat Security Team on 14 September 2023. The issue was made public on 10 October 2023.

Affects: 10.1.0-M1 to 10.1.13

Important: Information Disclosure CVE-2023-42795

When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next.

This was fixed with commit 9375d671.

This issue was identified by the Tomcat Security Team on 13 September 2023. The issue was made public on 10 October 2023.
Comment 1 Larry the Git Cow gentoo-dev 2023-10-11 08:39:03 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=08e0500b7183d83fb1d6050f44895ef67d2f0eed

commit 08e0500b7183d83fb1d6050f44895ef67d2f0eed
Author:     Miroslav Šulc <fordfrog@gentoo.org>
AuthorDate: 2023-10-11 08:38:48 +0000
Commit:     Miroslav Šulc <fordfrog@gentoo.org>
CommitDate: 2023-10-11 08:38:59 +0000

    www-servers/tomcat: dropped obsolete 8.5.93, 9.0.80 & 10.1.13
    
    Bug: https://bugs.gentoo.org/915578
    Bug: https://bugs.gentoo.org/915568
    Signed-off-by: Miroslav Šulc <fordfrog@gentoo.org>

 www-servers/tomcat/Manifest              |   7 --
 www-servers/tomcat/tomcat-10.1.13.ebuild | 181 -------------------------------
 www-servers/tomcat/tomcat-8.5.93.ebuild  | 154 --------------------------
 www-servers/tomcat/tomcat-9.0.80.ebuild  | 180 ------------------------------
 4 files changed, 522 deletions(-)
Comment 2 Miroslav Šulc gentoo-dev 2023-10-11 08:39:26 UTC
the tree is clean now, you can proceed.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-10-30 00:10:59 UTC
CVE-2023-42794 (https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82):

Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, 
in progress refactoring that exposed a potential denial of service on 
Windows if a web application opened a stream for an uploaded file but 
failed to close the stream. The file would never be deleted from disk 
creating the possibility of an eventual denial of service due to the 
disk being full.

Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.