Bug 1212230 (CVE-2023-34241) - VUL-0: CVE-2023-34241: cups: use-after-free bug that impacts the entire cupsd process
Summary: VUL-0: CVE-2023-34241: cups: use-after-free bug that impacts the entire cupsd...
Status: RESOLVED FIXED
Alias: CVE-2023-34241
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Johannes Meixner
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/369059/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-06-12 10:15 UTC by Gianluca Gabrielli
Modified: 2023-09-20 16:30 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 17 Marcus Meissner 2023-06-22 11:12:15 UTC
is public.

Subject: [oss-security] CVE-2023-34241: CUPS: use-after-free in cupsdAcceptClient()

Hi all,

there is currently the embargoed CVE-2023-34241 in CUPS project:


      Summary

Cups logs data of free memory to the logging service AFTER the 
connection has been closed, when it should have logged the data right 
before.


      Details

The exact cause of this issue is the function httpClose(con->http) being 
called in scheduler/client.c before

|httpClose(con->http); cupsdLogClient(con, CUPSDLOGWARN, "IP lookup 
failed - connection from %s closed!", httpGetHostname(con->http, NULL, 0));|

The problem is that httpClose always, provided its argument is not null, 
frees the pointer at the end of the call, only for cupsdLogClient to 
pass the pointer to httpGetHostname.

This issue happens in function cupsdAcceptClient if LogLevel is |warn| 
or higher and in two scenarios:

  * there is a double-lookup for the IP Address (|HostNameLookups
    Double| is set in |cupsd.conf|) which fails to resolve,
  * or if CUPS is compiled with TCP wrappers and the connection is
    refused by rules from |/etc/hosts.allow| and |/etc/hosts.deny|.


      Reproducer

None provided


      Impact

This is a use-after-free bug, that impacts the entire cupsd process.

If you need an exploit scenario, consider: local (unprivileged) attacker 
who happens to be able to read the log using it to exfiltrate private 
keys and info from a privileged cups daemon
or simply denial-of-service by making it crash.


      Patch

Committed as 
https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2


For OpenPrinting CUPS community,

Zdenek Dohnal (CUPS 2.4.x release manager)

-- 
Zdenek Dohnal
Senior Software Engineer
Red Hat, BRQ-TPBC
Comment 18 OBSbugzilla Bot 2023-06-22 11:35:02 UTC
This is an autogenerated message for OBS integration:
This bug (1212230) was mentioned in
https://build.opensuse.org/request/show/1094635 Factory / cups
Comment 19 Maintenance Automation 2023-06-22 16:30:03 UTC
SUSE-SU-2023:2616-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1212230
CVE References: CVE-2023-34241
Sources used:
openSUSE Leap Micro 5.3 (src): cups-2.2.7-150000.3.46.1
openSUSE Leap 15.4 (src): cups-2.2.7-150000.3.46.1
openSUSE Leap 15.5 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro 5.3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro 5.4 (src): cups-2.2.7-150000.3.46.1
Basesystem Module 15-SP4 (src): cups-2.2.7-150000.3.46.1
Basesystem Module 15-SP5 (src): cups-2.2.7-150000.3.46.1
Desktop Applications Module 15-SP5 (src): cups-2.2.7-150000.3.46.1
Development Tools Module 15-SP4 (src): cups-2.2.7-150000.3.46.1
Development Tools Module 15-SP5 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Real Time 15 SP3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cups-2.2.7-150000.3.46.1
SUSE Manager Proxy 4.2 (src): cups-2.2.7-150000.3.46.1
SUSE Manager Retail Branch Server 4.2 (src): cups-2.2.7-150000.3.46.1
SUSE Manager Server 4.2 (src): cups-2.2.7-150000.3.46.1
SUSE Enterprise Storage 7.1 (src): cups-2.2.7-150000.3.46.1
SUSE Enterprise Storage 7 (src): cups-2.2.7-150000.3.46.1
SUSE CaaS Platform 4.0 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro 5.2 (src): cups-2.2.7-150000.3.46.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): cups-2.2.7-150000.3.46.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 21 Johannes Meixner 2023-06-26 11:17:09 UTC
https://build.opensuse.org/request/show/1094635
is accepted so this issue is FIXED.
Comment 24 Maintenance Automation 2023-09-20 16:30:08 UTC
SUSE-SU-2023:3706-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1212230, 1214254, 1215204
CVE References: CVE-2023-32360, CVE-2023-34241, CVE-2023-4504
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server 12 SP5 (src): cups-1.7.5-20.46.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): cups-1.7.5-20.46.1
SUSE OpenStack Cloud 9 (src): cups-1.7.5-20.46.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.