Bug 2209603 (CVE-2023-32324) - CVE-2023-32324 cups: heap buffer overflow may lead to DoS
Summary: CVE-2023-32324 cups: heap buffer overflow may lead to DoS
Keywords:
Status: NEW
Alias: CVE-2023-32324
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2209610 2209611 2209612 2214939
Blocks: 2209348
TreeView+ depends on / blocked
 
Reported: 2023-05-24 08:24 UTC by Marian Rehak
Modified: 2024-04-01 03:05 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Cups package. A buffer overflow vulnerability in the |format_log_line| function could allow remote attackers to cause a denial of service. Exploitation is only possible when the configuration file, cupsd.conf, has the value of loglevel set to DEBUG.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6596 0 None None None 2023-11-07 08:20:56 UTC
Red Hat Product Errata RHSA-2023:7165 0 None None None 2023-11-14 15:22:09 UTC
Red Hat Product Errata RHSA-2024:1101 0 None None None 2024-03-05 15:03:49 UTC
Red Hat Product Errata RHSA-2024:1409 0 None None None 2024-03-19 17:30:07 UTC

Description Marian Rehak 2023-05-24 08:24:28 UTC
A buffer overflow vulnerability in the function |format_log_line| could allow remote attackers to cause a denial-of-service(DoS) on the affected  system (not verified for possible arbitrary code execution). Exploitation of the vulnerability can be triggered when the  configuration file |cupsd.conf| sets the value of |loglevel |to |DEBUG|.

Comment 5 Marian Rehak 2023-06-14 07:47:27 UTC
Created cups tracking bugs for this issue:

Affects: fedora-all [bug 2214939]

Comment 7 errata-xmlrpc 2023-11-07 08:20:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6596 https://access.redhat.com/errata/RHSA-2023:6596

Comment 8 errata-xmlrpc 2023-11-14 15:22:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7165 https://access.redhat.com/errata/RHSA-2023:7165

Comment 10 errata-xmlrpc 2024-03-05 15:03:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:1101 https://access.redhat.com/errata/RHSA-2024:1101

Comment 11 errata-xmlrpc 2024-03-19 17:30:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:1409 https://access.redhat.com/errata/RHSA-2024:1409


Note You need to log in before you can comment on or make changes to this bug.