Linux Vulnerability Announced, Details Kept Secret  [Solved]

For interesting topics. But remember this is a Linux Forum. Do not post offensive topics that are meant to cause trouble with other members or are derogatory towards people of different genders, race, color, minors (this includes nudity and sex), politics or religion. Let's try to keep peace among the community and for visitors.

No spam on this or any other forums please! If you post advertisements on these forums, your account may be deleted.

Do not copy and paste entire or even up to half of someone else's words or articles into posts. Post only a few sentences or a paragraph and make sure to include a link back to original words or article. Otherwise it's copyright infringement.

You can talk about other distros here, but no MX bashing. You can email the developers of MX if you just want to say you dislike or hate MX.
Message
Author
User avatar
mxethernut
Posts: 73
Joined: Mon Jul 01, 2024 11:38 am

Re: Linux Vulnerability Announced, Details Kept Secret

#21 Post by mxethernut »

Thank you MX/Debian for getting updates out quickly!

User avatar
richb
Administrator
Posts: 10841
Joined: Wed Jul 12, 2006 2:17 pm

Re: Linux Vulnerability Announced, Details Kept Secret

#22 Post by richb »

Forum Rules
Guide - How to Ask for Help

richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB

User avatar
Eadwine Rose
Administrator
Posts: 14428
Joined: Wed Jul 12, 2006 2:10 am

Re: Linux Vulnerability Announced, Details Kept Secret

#23 Post by Eadwine Rose »

I SO hit on those like a boss. :cool:
MX-23.6_x64 July 31 2023 * 6.1.0-34amd64 ext4 Xfce 4.20.0 * 8-core AMD Ryzen 7 2700
Asus TUF B450-Plus Gaming UEFI * Asus GTX 1050 Ti Nvidia 535.216.01 * 2x16Gb DDR4 2666 Kingston HyperX Predator
Samsung 870EVO * Samsung S24D330 & P2250 * HP Envy 5030

User avatar
mxethernut
Posts: 73
Joined: Mon Jul 01, 2024 11:38 am

Re: Linux Vulnerability Announced, Details Kept Secret

#24 Post by mxethernut »

Details Kept Secret

Hm details were disclosed, but above my knowledge!

https://youtu.be/lXljErWpcRQ?t=68

User avatar
uncle mark
Posts: 851
Joined: Sat Nov 11, 2006 9:42 pm

Re: Linux Vulnerability Announced, Details Kept Secret

#25 Post by uncle mark »

So all the Linux installs around the world aren't going to get pwnd any time soon?
Custom build Asus/AMD/nVidia circa 2011 -- MX 19.2 KDE
Acer Aspire 5250 -- MX 21 KDE
Toshiba Satellite C55 -- MX 18.3 Xfce
Assorted Junk -- assorted Linuxes

User avatar
karlchen
Posts: 106
Joined: Sun Jun 07, 2020 4:35 pm

Re: Linux Vulnerability Announced, Details Not Kept Secret

#26 Post by karlchen »

Hi, folks.

Although the thread title told otherwise, the details about the CUPS vulnerabilities have been publically available since September 26th e.g. in several written articles on several webpages.
Anway.
The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now. :happy:

Received them on my MX 21.3 only a few minutes ago.

Code: Select all

cups (2.3.3op2-3+deb11u9) bullseye-security; urgency=medium

  * CVE-2024-47175
    Fix CVE and upstream also added some extra hardening to patch
    - validate URIs, attribute names, and capabilities
      in cups/ppd-cache.c, scheduler/ipp.c
    - sanitize make and model in cups/ppd-cache.c
    - PPDize preset and template names in cups/ppd-cache.c
    - quote PPD localized strings in  cups/ppd-cache.c
    - fix warnings in cups/ppd-cache.c

 -- Thorsten Alteholz <debian@alteholz.de>  Thu, 26 Sep 2024 23:45:05 +0200

Code: Select all

cups-filters (1.28.7-1+deb11u3) bullseye-security; urgency=high

  * CVE-2024-47076 (Closes: #1082827)
    cfGetPrinterAttributes5(): Validate response attributes before return
  * CVE-2024-47176 (Closes: #1082820)
    Default BrowseRemoteProtocols should not include "cups" protocol

 -- Thorsten Alteholz <debian@alteholz.de>  Thu, 26 Sep 2024 23:45:05 +0200
Karl
"I killed her in pure self-defense", said the bear after crushing the mouse. "She threatened my life."
The Prophet's Song

User avatar
entropyfoe
Posts: 615
Joined: Thu Apr 19, 2007 11:42 am

Re: Linux Vulnerability Announced, Details Kept Secret

#27 Post by entropyfoe »

carlchen wrote
The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now. :happy:
Received them on my MX 21.3 only a few minutes ago.
Thanks to the dev and packaging team, and up stream at Debian.

Thanks for the swift action.
:cool:
MX 23.5 on Asus PRIME X470-PRO
AMD Ryzen 3600X (12 threads @ 3.8 GHz)
32 Gig DDR4 3600 (Crucial CL 16)
Nvidia GeForce GT 710
Samsung 970 NVMe nvme0n1 P1-3=MX-23.5, P4=testing
Samsung 980 NVMe =1TB Data, plus 2TB WD =backups
on-board ethernet & sound

User avatar
GuiGuy
Posts: 832
Joined: Sun Dec 16, 2007 5:29 pm

Re: Linux Vulnerability Announced, Details Kept Secret

#28 Post by GuiGuy »

:number1:

User avatar
Stevo
Developer
Posts: 14420
Joined: Fri Dec 15, 2006 7:07 pm

Re: Linux Vulnerability Announced, Details Kept Secret

#29 Post by Stevo »

entropyfoe wrote: Sun Sep 29, 2024 6:25 pm carlchen wrote
The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now. :happy:
Received them on my MX 21.3 only a few minutes ago.
Thanks to the dev and packaging team, and up stream at Debian.

Thanks for the swift action.
:cool:
All credit goes to Debian for this response, we devs just stand by and cheer them on for these fixes. :yay: :yay: :yay:
MXPI = MX Package Installer
QSI = Quick System Info from menu
The MX Test repository is mostly backports; not the same as Debian testing

User avatar
LinuxSpring1
Posts: 274
Joined: Sun May 05, 2024 8:57 am

Re: Linux Vulnerability Announced, Details Kept Secret

#30 Post by LinuxSpring1 »

CharlesV wrote: Thu Sep 26, 2024 8:35 pm Another short read on the issue
https://www.phoronix.com/news/Linux-CVSS-9.9-Rating
The temporary fix for this as mentioned in the link is to
This remote code execution issue can be exploited across the public Internet via a UDP packet to port 631 without needing any authentication, assuming the CUPS port is open through your router/firewall. LAN attacks are also possible via spoofing zeroconf / mDNS / DNS-SD advertisements.

Besides CUPS being used on Linux distributions, it also affects some BSDs, Oracle Solaris, Google Chrome OS, and others.

As of writing there is no Linux fix available for this high profile security issue. In the meantime it's recommended to disable and remove the "cups-browsed" service, updating CUPS, or at least blocking all traffic to UDP port 631.
So till a fix is made available does the UDP port 631 need to be blocked? And/Or should the cups-browsed service be disabled? It is enabled by default on KDE MX Linux 23.3 having Debian 12.7.

dreamer wrote: Sat Sep 28, 2024 6:53 am The severe vulnerability 9.9/10 doesn’t impact basic printing and scanning.

The easiest solution is to uninstall the cups-browsed package. I always do this on my personal snapshots. It doesn’t affect printing or scanning. If you don’t want to uninstall the cups-browsed package you can disable the service while you wait for patches to be delivered.

Red Hat has a good write-up:
https://www.redhat.com/en/blog/red-hat- ... rabilities
Actually @dreamer that might not be correct. From the article that is linked
Mitigation of these vulnerabilities is as simple as running two commands, especially in any environment where printing is not needed.
So if the service cups-browsed is disabled or the package is uninstalled then will not the printing and scanning be impacted? Because the RedHat article refers to the case where printing is not needed. Many of us are using Desktops and there printing and scanning is required.

Post Reply

Return to “General”