RHEL-113073 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS

Resolves: RHEL-113073
This commit is contained in:
Zdenek Dohnal 2025-09-11 14:25:14 +02:00
parent f052eacf6b
commit 042df1cc97
2 changed files with 48 additions and 0 deletions

43
CVE-2025-58364.patch Normal file
View File

@ -0,0 +1,43 @@
diff -up cups-2.4.10/cups/ipp.c.cve-2025-58364 cups-2.4.10/cups/ipp.c
--- cups-2.4.10/cups/ipp.c.cve-2025-58364 2025-09-05 07:31:10.024210666 +0200
+++ cups-2.4.10/cups/ipp.c 2025-09-05 07:33:36.960140431 +0200
@@ -2949,31 +2949,6 @@ ippReadIO(void *src, /* I - Data
*/
tag = (ipp_tag_t)buffer[0];
- if (tag == IPP_TAG_EXTENSION)
- {
- /*
- * Read 32-bit "extension" tag...
- */
-
- if ((*cb)(src, buffer, 4) < 4)
- {
- DEBUG_puts("1ippReadIO: Callback returned EOF/error");
- goto rollback;
- }
-
- tag = (ipp_tag_t)((buffer[0] << 24) | (buffer[1] << 16) | (buffer[2] << 8) | buffer[3]);
-
- if (tag & IPP_TAG_CUPS_CONST)
- {
- /*
- * Fail if the high bit is set in the tag...
- */
-
- _cupsSetError(IPP_STATUS_ERROR_INTERNAL, _("IPP extension tag larger than 0x7FFFFFFF."), 1);
- DEBUG_printf(("1ippReadIO: bad tag 0x%x.", tag));
- goto rollback;
- }
- }
if (tag == IPP_TAG_END)
{
@@ -3196,6 +3171,7 @@ ippReadIO(void *src, /* I - Data
if ((*cb)(src, buffer, (size_t)n) < n)
{
+ _cupsSetError(IPP_STATUS_ERROR_INTERNAL, _("Unable to read IPP attribute name."), 1);
DEBUG_puts("1ippReadIO: unable to read name.");
goto rollback;
}

View File

@ -107,6 +107,8 @@ Patch1012: 0001-tls-gnutls.c-Use-system-crypto-policy-if-available.patch
Patch1013: 0001-Add-NoSystem-SSLOptions-value.patch
# RHEL-112419 CVE-2025-58060 cups: Authentication Bypass in CUPS Authorization Handling
Patch1014: CVE-2025-58060.patch
# RHEL-113073 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
Patch1015: CVE-2025-58364.patch
##### Patches removed because IMHO they aren't no longer needed
@ -366,6 +368,8 @@ to CUPS daemon. This solution will substitute printer drivers and raw queues in
%patch -P 1013 -p1 -b .nosystem-ssloption
# RHEL-112419 CVE-2025-58060 cups: Authentication Bypass in CUPS Authorization Handling
%patch -P 1014 -p1 -b .cve-2025-58060
# RHEL-113073 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
%patch -P 1015 -p1 -b .cve-2025-58364
# Log to the system journal by default (bug #1078781, bug #1519331).
@ -837,6 +841,7 @@ rm -f %{cups_serverbin}/backend/smb
%changelog
* Thu Sep 11 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-12
- RHEL-112419 CVE-2025-58060 cups: Authentication Bypass in CUPS Authorization Handling
- RHEL-113073 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
* Tue Jan 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-11
- provide a way how to opt-out from system crypto policy if needed