Bug 2243751 (CVE-2023-42794)

Summary: CVE-2023-42794 tomcat: FileUpload: DoS due to accumulation of temporary files on Windows
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adupliak, aileenc, anstephe, aogburn, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, chfoley, csutherl, darran.lofthouse, dereed, dhanak, dkreling, dosoudil, drichtar, fjuma, fmariani, gmalinko, ibek, ivassile, iweiss, janstey, jclere, jpoth, jrokos, jross, jscholz, kverlaen, lgao, lthon, mmadzin, mnovotny, mosmerov, msochure, mstefank, msvehla, mulliken, nwallace, owatkins, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, pskopek, rguimara, rkieley, rowaters, rruss, rstancel, saroy, sdawley, smaestri, sthorger, swoodman, szappis, tcunning, tom.jenkinson, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: tomcat 9.0.81, tomcat 8.5.94 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Apache Tomcat. An incomplete cleanup vulnerability with the internal fork of the Commons FileUpload package exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from the disk, potentially leading to a denial of service due to the disk being full.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2244525, 2245766    
Bug Blocks: 2243753    

Description Anten Skrabec 2023-10-12 21:26:18 UTC
Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, 
in progress refactoring that exposed a potential denial of service on 
Windows if a web application opened a stream for an uploaded file but 
failed to close the stream. The file would never be deleted from disk 
creating the possibility of an eventual denial of service due to the 
disk being full.

Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
http://www.openwall.com/lists/oss-security/2023/10/10/8

Comment 2 Aaron Ogburn 2023-10-16 17:27:25 UTC
Can we please create JWS trackers for this?

Comment 9 Patrick Del Bello 2023-10-24 01:55:02 UTC
Created tomcat tracking bugs for this issue:

Affects: fedora-all [bug 2245766]

Comment 11 errata-xmlrpc 2023-11-15 17:08:14 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.12.1

Via RHSA-2023:7247 https://access.redhat.com/errata/RHSA-2023:7247

Comment 13 errata-xmlrpc 2024-01-10 11:27:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0125 https://access.redhat.com/errata/RHSA-2024:0125

Comment 14 errata-xmlrpc 2024-01-24 16:31:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0474 https://access.redhat.com/errata/RHSA-2024:0474