Fix for CVE-2023-46589 in Jammy's tomcat9

Bug #2047933 reported by Troels Arvin
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tomcat9 (Ubuntu)
New
Undecided
Unassigned
Jammy
New
Undecided
Unassigned

Bug Description

Ubuntu 22 Jammy lacks a fix for CVE-2023-46589 (CVE date: 2023-10-23, CVSS3 severity 7.5).

Debian writes they have fixed it by releasing tomcat9 v 9.0.70-2 for "sid" and "bookworm": https://security-tracker.debian.org/tracker/CVE-2023-46589
(That's a bit surprising, since Debian's package 9.0.70-2 is from May of 2023.)

Ubuntu should release a tomcat9 with a fix for the vulnerability.

CVE References

Revision history for this message
Robie Basak (racb) wrote :

Please note that tomcat9 in Ubuntu Jammy is in universe and community supported. If you can contribute the fix, please see https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

information type: Public → Public Security
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

tags: added: community-security
Revision history for this message
Troels Arvin (troels-w) wrote :

OK, I've created a Tomcat 9 package set which has a fix for the CVE.

I didn't base it on the very latest Tomcat 9, because Java 17 has become a requirement for the very latest Tomcat 9 releases, somewhat surprisingly.

https://launchpad.net/~troels-w/+archive/ubuntu/tomcat-slipstream

Revision history for this message
Thomas Ward (teward) wrote :

NOTE: This is already pending fixes for Noble as the updated version from Debian is synced in and sitting in Proposed.

Revision history for this message
Troels Arvin (troels-w) wrote :

@thomas, can you help me understand this better? (I'm rather new in the Ubuntu world, having mostly used distros in the Red Hat family before.)

Where can I inspect details the package which is about to enter Ubuntu 22's Universe? And how about the package about to enter Noble?

The thing is last I checked, Debian had not fixed this CVE in any Tomcat packages.

Revision history for this message
Seth Arnold (seth-arnold) wrote :

Actually, should we kill tomcat9 before Noble is released?

The 9.0.70-2 version was uploaded in october https://launchpad.net/ubuntu/+source/tomcat9 and it hasn't migrated from proposed to release yet because it trips autopkgtest failures https://ubuntu-archive-team.ubuntu.com/proposed-migration/update_excuses.html#tomcat9

The Debian changelog says:

  * Drop tomcat9 server packages because only one Tomcat version is supported
    per release. Only retain libtomcat9-java because of compatibility reasons
    for now. Users are strongly encouraged to switch to Tomcat 10 instead.
    (Closes: #1034824)

If this package migrates, we lose the tomcat9 server in noble and later. If this package doesn't migrate, then we keep shipping a vulnerable version. We could accept Troels's fixes, or we could drop the package entirely.

What's best?

Thanks

Revision history for this message
Mark Dai (mdai) wrote :

@troels, could you please bump the version to 9.0.83+ in that PPA? As suggested, CVE-2023-46589 was not fixed until 9.0.83
https://nvd.nist.gov/vuln/detail/CVE-2023-46589

Thanks

Revision history for this message
Troels Arvin (troels-w) wrote :

Seth: I agree tomcat9 does not have a place for Noble.

Mark: Tomcat 9.0.83 needs to built with Java 17, according to its release notes. I suppose in principle, it does not rule out running the resulting binaries with Java 11, but I think it sounds risky.
I think it's important to not introduce a sudden Java 17 dependency into a long-term release like Jammy.
So I chose to use the latest version of Tomcat 9 which fully supports Java 11, and then I backported the fix for CVE-2023-46589 to it.

If someone can make a compelling argument for it being safe to build with Java 17 but run with Java 11, then we could move to the latest Tomcat.

Revision history for this message
Vladimir Petko (vpa1977) wrote (last edit ):

I wonder if I should prepare 9.0.86 for Noble, because there is still use for it (Java 8-based applications)?

Regarding safety: according to tomcat version page[1] 9.0.x can be safely ran on Java 8 and up. Hence it safe to run with Java 11.
Though it would violate Debian Java policy to build it with jdk other than default.

I should check if tomcat 9 can be built with 11 in packaging, as the requirement for 17 seems to come from the build dependency binaries, not the code itself.

[1] https://tomcat.apache.org/whichversion.html

Revision history for this message
Troels Arvin (troels-w) wrote :

Where I work, having tomcat9 for Ubuntu 24 would be great, but can we sustain it for years and years, along with other Tomcat generations?

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.