[Debian] High CVE: CVE-2023-4504/CVE-2023-32324/CVE-2023-32360/CVE-2023-34241 cups: multiple CVEs

Bug #2038796 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
hqbai

Bug Description

CVE-2023-4504: https://nvd.nist.gov/vuln/detail/CVE-2023-4504

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

CVE-2023-32324: https://nvd.nist.gov/vuln/detail/CVE-2023-32324

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVE-2023-32360: https://nvd.nist.gov/vuln/detail/CVE-2023-32360

An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.

CVE-2023-34241: https://nvd.nist.gov/vuln/detail/CVE-2023-34241

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process.

The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/hosts.deny`.

Version 2.4.6 has a patch for this issue.

Base Score: High

Reference:

['libcups2_2.3.3op2-3+deb11u2_amd64.deb===>libcups2_2.3.3op2-3+deb11u4_amd64.deb']

Yue Tao (wrytao)
summary: - [Debian] High CVE: CVE-2023-4504 cups: are susceptible to a heap-based
- buffer overflow
+ [Debian] High CVE:
+ CVE-2023-4504/CVE-2023-32324/CVE-2023-32360/CVE-2023-34241 cups:
+ multiple CVEs
description: updated
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/899017

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/899017
Committed: https://opendev.org/starlingx/tools/commit/5d2b2ef846b5b3a2807431d54e9ae9238d869b61
Submitter: "Zuul (22348)"
Branch: master

commit 5d2b2ef846b5b3a2807431d54e9ae9238d869b61
Author: Haiqing Bai <email address hidden>
Date: Sun Oct 22 22:41:56 2023 -0700

    Debian: cups: fix 4 CVEs

    Upgraded libcups2 to libcups2_2.3.3op2-3+deb11u6_amd64.deb
    to fix below 4 CVEs:
    CVE-2023-4504
    CVE-2023-32324
    CVE-2023-32360
    CVE-2023-34241

    Refer to:
    https://security-tracker.debian.org/tracker/CVE-2023-32324
    https://security-tracker.debian.org/tracker/CVE-2023-32360
    https://security-tracker.debian.org/tracker/CVE-2023-34241

    Test Plan:
    Pass: downloader
    Pass: build-pkgs --clean --all
    Pass: build-image
    Pass: boot

    Closes-bug: #2038796

    Change-Id: I4190c2fa265175eb2830dff5bac1db2db497db77
    Signed-off-by: Haiqing Bai <email address hidden>

Changed in starlingx:
status: In Progress → Fix Released
Ghada Khalil (gkhalil)
Changed in starlingx:
assignee: nobody → hqbai (hbai)
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.