Linux Vulnerability Announced, Details Kept Secret [Solved]
- mxethernut
- Posts: 73
- Joined: Mon Jul 01, 2024 11:38 am
Re: Linux Vulnerability Announced, Details Kept Secret
Thank you MX/Debian for getting updates out quickly!
Re: Linux Vulnerability Announced, Details Kept Secret
Just got the updates.
https://linuxsecurity.com/advisories/de ... xob7hyzfsf
https://linuxsecurity.com/advisories/de ... xob7hyzfsf
Forum Rules
Guide - How to Ask for Help
richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB
Guide - How to Ask for Help
richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB
- Eadwine Rose
- Administrator
- Posts: 14428
- Joined: Wed Jul 12, 2006 2:10 am
Re: Linux Vulnerability Announced, Details Kept Secret
I SO hit on those like a boss. 

MX-23.6_x64 July 31 2023 * 6.1.0-34amd64 ext4 Xfce 4.20.0 * 8-core AMD Ryzen 7 2700
Asus TUF B450-Plus Gaming UEFI * Asus GTX 1050 Ti Nvidia 535.216.01 * 2x16Gb DDR4 2666 Kingston HyperX Predator
Samsung 870EVO * Samsung S24D330 & P2250 * HP Envy 5030
Asus TUF B450-Plus Gaming UEFI * Asus GTX 1050 Ti Nvidia 535.216.01 * 2x16Gb DDR4 2666 Kingston HyperX Predator
Samsung 870EVO * Samsung S24D330 & P2250 * HP Envy 5030
- mxethernut
- Posts: 73
- Joined: Mon Jul 01, 2024 11:38 am
Re: Linux Vulnerability Announced, Details Kept Secret
Details Kept Secret
Hm details were disclosed, but above my knowledge!
https://youtu.be/lXljErWpcRQ?t=68
- uncle mark
- Posts: 851
- Joined: Sat Nov 11, 2006 9:42 pm
Re: Linux Vulnerability Announced, Details Kept Secret
So all the Linux installs around the world aren't going to get pwnd any time soon?
Custom build Asus/AMD/nVidia circa 2011 -- MX 19.2 KDE
Acer Aspire 5250 -- MX 21 KDE
Toshiba Satellite C55 -- MX 18.3 Xfce
Assorted Junk -- assorted Linuxes
Acer Aspire 5250 -- MX 21 KDE
Toshiba Satellite C55 -- MX 18.3 Xfce
Assorted Junk -- assorted Linuxes
Re: Linux Vulnerability Announced, Details Not Kept Secret
Hi, folks.
Although the thread title told otherwise, the details about the CUPS vulnerabilities have been publically available since September 26th e.g. in several written articles on several webpages.
Anway.
The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now.
Received them on my MX 21.3 only a few minutes ago.
Karl
Although the thread title told otherwise, the details about the CUPS vulnerabilities have been publically available since September 26th e.g. in several written articles on several webpages.
Anway.
The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now.

Received them on my MX 21.3 only a few minutes ago.
Code: Select all
cups (2.3.3op2-3+deb11u9) bullseye-security; urgency=medium
* CVE-2024-47175
Fix CVE and upstream also added some extra hardening to patch
- validate URIs, attribute names, and capabilities
in cups/ppd-cache.c, scheduler/ipp.c
- sanitize make and model in cups/ppd-cache.c
- PPDize preset and template names in cups/ppd-cache.c
- quote PPD localized strings in cups/ppd-cache.c
- fix warnings in cups/ppd-cache.c
-- Thorsten Alteholz <debian@alteholz.de> Thu, 26 Sep 2024 23:45:05 +0200
Code: Select all
cups-filters (1.28.7-1+deb11u3) bullseye-security; urgency=high
* CVE-2024-47076 (Closes: #1082827)
cfGetPrinterAttributes5(): Validate response attributes before return
* CVE-2024-47176 (Closes: #1082820)
Default BrowseRemoteProtocols should not include "cups" protocol
-- Thorsten Alteholz <debian@alteholz.de> Thu, 26 Sep 2024 23:45:05 +0200
"I killed her in pure self-defense", said the bear after crushing the mouse. "She threatened my life."
The Prophet's Song
The Prophet's Song
- entropyfoe
- Posts: 615
- Joined: Thu Apr 19, 2007 11:42 am
Re: Linux Vulnerability Announced, Details Kept Secret
carlchen wrote
Thanks for the swift action.
Thanks to the dev and packaging team, and up stream at Debian.The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now.
Received them on my MX 21.3 only a few minutes ago.
Thanks for the swift action.

MX 23.5 on Asus PRIME X470-PRO
AMD Ryzen 3600X (12 threads @ 3.8 GHz)
32 Gig DDR4 3600 (Crucial CL 16)
Nvidia GeForce GT 710
Samsung 970 NVMe nvme0n1 P1-3=MX-23.5, P4=testing
Samsung 980 NVMe =1TB Data, plus 2TB WD =backups
on-board ethernet & sound
AMD Ryzen 3600X (12 threads @ 3.8 GHz)
32 Gig DDR4 3600 (Crucial CL 16)
Nvidia GeForce GT 710
Samsung 970 NVMe nvme0n1 P1-3=MX-23.5, P4=testing
Samsung 980 NVMe =1TB Data, plus 2TB WD =backups
on-board ethernet & sound
Re: Linux Vulnerability Announced, Details Kept Secret
All credit goes to Debian for this response, we devs just stand by and cheer them on for these fixes.entropyfoe wrote: ↑Sun Sep 29, 2024 6:25 pm carlchen wroteThanks to the dev and packaging team, and up stream at Debian.The most important detail is: the Debian CUPS patches are being distributed by the MX Updater by now.
Received them on my MX 21.3 only a few minutes ago.
Thanks for the swift action.![]()



MXPI = MX Package Installer
QSI = Quick System Info from menu
The MX Test repository is mostly backports; not the same as Debian testing
QSI = Quick System Info from menu
The MX Test repository is mostly backports; not the same as Debian testing
- LinuxSpring1
- Posts: 274
- Joined: Sun May 05, 2024 8:57 am
Re: Linux Vulnerability Announced, Details Kept Secret
The temporary fix for this as mentioned in the link is toCharlesV wrote: ↑Thu Sep 26, 2024 8:35 pm Another short read on the issue
https://www.phoronix.com/news/Linux-CVSS-9.9-Rating
So till a fix is made available does the UDP port 631 need to be blocked? And/Or should the cups-browsed service be disabled? It is enabled by default on KDE MX Linux 23.3 having Debian 12.7.This remote code execution issue can be exploited across the public Internet via a UDP packet to port 631 without needing any authentication, assuming the CUPS port is open through your router/firewall. LAN attacks are also possible via spoofing zeroconf / mDNS / DNS-SD advertisements.
Besides CUPS being used on Linux distributions, it also affects some BSDs, Oracle Solaris, Google Chrome OS, and others.
As of writing there is no Linux fix available for this high profile security issue. In the meantime it's recommended to disable and remove the "cups-browsed" service, updating CUPS, or at least blocking all traffic to UDP port 631.
Actually @dreamer that might not be correct. From the article that is linkeddreamer wrote: ↑Sat Sep 28, 2024 6:53 am The severe vulnerability 9.9/10 doesn’t impact basic printing and scanning.
The easiest solution is to uninstall the cups-browsed package. I always do this on my personal snapshots. It doesn’t affect printing or scanning. If you don’t want to uninstall the cups-browsed package you can disable the service while you wait for patches to be delivered.
Red Hat has a good write-up:
https://www.redhat.com/en/blog/red-hat- ... rabilities
So if the service cups-browsed is disabled or the package is uninstalled then will not the printing and scanning be impacted? Because the RedHat article refers to the case where printing is not needed. Many of us are using Desktops and there printing and scanning is required.Mitigation of these vulnerabilities is as simple as running two commands, especially in any environment where printing is not needed.