Bug 2214914 (CVE-2023-34241) - CVE-2023-34241 cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
Summary: CVE-2023-34241 cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
Keywords:
Status: NEW
Alias: CVE-2023-34241
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2214915 2214917 2216717 2216718
Blocks: 2214604
TreeView+ depends on / blocked
 
Reported: 2023-06-14 04:51 UTC by Sandipan Roy
Modified: 2024-03-19 17:30 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6596 0 None None None 2023-11-07 08:20:59 UTC
Red Hat Product Errata RHSA-2023:7165 0 None None None 2023-11-14 15:22:11 UTC
Red Hat Product Errata RHSA-2024:1101 0 None None None 2024-03-05 15:03:50 UTC
Red Hat Product Errata RHSA-2024:1409 0 None None None 2024-03-19 17:30:08 UTC

Description Sandipan Roy 2023-06-14 04:51:21 UTC
The exact cause of this issue is the function httpClose(con->http) being called in scheduler/client.c before |httpClose(con->http); cupsdLogClient(con, CUPSDLOGWARN, "IP lookup failed - connection from %s closed!", httpGetHostname(con->http, NULL, 0));|

The problem is that httpClose always, provided its argument is not null,frees the pointer at the end of the call, only for cupsdLogClient to 
pass the pointer to httpGetHostname.

Comment 3 Sandipan Roy 2023-06-22 11:06:45 UTC
Created cups tracking bugs for this issue:

Affects: fedora-37 [bug 2216717]
Affects: fedora-38 [bug 2216718]

Comment 5 errata-xmlrpc 2023-11-07 08:20:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6596 https://access.redhat.com/errata/RHSA-2023:6596

Comment 6 errata-xmlrpc 2023-11-14 15:22:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7165 https://access.redhat.com/errata/RHSA-2023:7165

Comment 8 errata-xmlrpc 2024-03-05 15:03:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:1101 https://access.redhat.com/errata/RHSA-2024:1101

Comment 9 errata-xmlrpc 2024-03-19 17:30:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:1409 https://access.redhat.com/errata/RHSA-2024:1409


Note You need to log in before you can comment on or make changes to this bug.