Linux Vulnerability Announced, Details Kept Secret [Solved]
Re: Linux Vulnerability Announced, Details Kept Secret
It looked like the fixes that were posted resolved 3 of the 4 issues ?
If your machine is not in a hostile environment, and you have a firewall between you and the internet (ie your machine ip is not exposed TO the internet)... then there is little chance there will be an issue.
But, yes, it looks like blocking UDP port 631 will be the best stop for this.
If your machine is not in a hostile environment, and you have a firewall between you and the internet (ie your machine ip is not exposed TO the internet)... then there is little chance there will be an issue.
But, yes, it looks like blocking UDP port 631 will be the best stop for this.
*QSI = Quick System Info from menu (Copy for Forum)
*MXPI = MX Package Installer
*Please check the solved checkbox on the post that solved it.
*Linux -This is the way!
*MXPI = MX Package Installer
*Please check the solved checkbox on the post that solved it.
*Linux -This is the way!
Re: Linux Vulnerability Announced, Details Kept Secret
@CharlesV Silly(?) Question:But, yes, it looks like blocking UDP port 631 will be the best stop for this.
I am not (to the best of my knowledge) in a hostile environment, and I occasionally use port 631 (localhost) to login, via my password-protected router, into "CUPS", so as to maintain and/or change my printers (drivers, names, etc), that are all (Network) shared on my Local Network (router).
Given all of the previous comments, should I NOT be using port 631?
I do not know of any other way to login to CUPS.
Oh...I'm not sure if I'm using UDP, or some other protocol. I guess I'm using whatever the defaults are for all MX distros (KDE, Fluxbox, Xfce)-- I use all of them.
Awaiting precious explication...

- mxethernut
- Posts: 73
- Joined: Mon Jul 01, 2024 11:38 am
Re: Linux Vulnerability Announced, Details Kept Secret
@operadude: Looks like you do not want to disable the system.d cups-browsed service because you need your printers:
and
on Sysvinit? (Not using it b/c of sound issues)
Do you have ufw/gufw installed and running as a service? You can close port 631 with this firewall. It will protect this and all other ports by default.
ufw deny 631/tcp >> Please check https://docs.e2enetworks.com/guides/ufw.html, this is for system.d however.
Is itjoekamprad @EOS forum wrote:to check if you have it enabledCode: Select all
systemctl status cups-browsed
to stop/disable.Code: Select all
sudo systemctl disable --now cups-browsed
Code: Select all
status cups-browsed.service
Code: Select all
sudo disable cups-browsed.service
Do you have ufw/gufw installed and running as a service? You can close port 631 with this firewall. It will protect this and all other ports by default.
ufw deny 631/tcp >> Please check https://docs.e2enetworks.com/guides/ufw.html, this is for system.d however.
Last edited by mxethernut on Mon Sep 30, 2024 6:44 am, edited 2 times in total.
Re: Linux Vulnerability Announced, Details Kept Secret
Hello, LinuxSpring1.
In case your network MFP printer has been added to your system through cups-browsed only, then switching off cup-browsed will indeed make the device disappear from the system again. So, the answer in this case would be: yes.
In case, however, your network MFP device has been set up manually e.g. through HPLIP like my HP Color Laserjet Pro MFP M277dw, then during this setup the MFP's IP address has been added to the relevant configuration files. As a consequence the system will not depend on cups-browsed in order to connect to the MFP. Printing and scanning will work without cups-browsed.
Note:
HPLIP is only used for HP printers and scanners. For printers of other producers you will have to install their appropriate driver software instead.
Hope my explanation was not too confusing.
Karl
The answer to this question is: well, it depends.LinuxSpring1 wrote: ↑Mon Sep 30, 2024 12:41 am So if the service cups-browsed is disabled or the package is uninstalled then will not the printing and scanning be impacted? Because the RedHat article refers to the case where printing is not needed. Many of us are using Desktops and there printing and scanning is required.
In case your network MFP printer has been added to your system through cups-browsed only, then switching off cup-browsed will indeed make the device disappear from the system again. So, the answer in this case would be: yes.
In case, however, your network MFP device has been set up manually e.g. through HPLIP like my HP Color Laserjet Pro MFP M277dw, then during this setup the MFP's IP address has been added to the relevant configuration files. As a consequence the system will not depend on cups-browsed in order to connect to the MFP. Printing and scanning will work without cups-browsed.
Note:
HPLIP is only used for HP printers and scanners. For printers of other producers you will have to install their appropriate driver software instead.
Hope my explanation was not too confusing.
Karl
"I killed her in pure self-defense", said the bear after crushing the mouse. "She threatened my life."
The Prophet's Song
The Prophet's Song
Re: Linux Vulnerability Announced, Details Kept Secret
Hell, mxethernut-
In order to prevent connecting to cups-browsed from outside you have to close UDP port 631.
In the most simple scenario you simply switch on ufw by executing This will tell the MX software firewall to reject any incoming connection requests, including UDP port 631.
Karl
Closing TCP port 631 is closing the CUPS port. I suspect this will prevent you from printing completely.mxethernut wrote: ↑Mon Sep 30, 2024 5:18 amDo you have ufw/gufw installed and running as a service? You can close port 631 with this firewall.Code: Select all
ufw deny 631/tcp
In order to prevent connecting to cups-browsed from outside you have to close UDP port 631.
In the most simple scenario you simply switch on ufw by executing
Code: Select all
sudo ufw enable
Karl
"I killed her in pure self-defense", said the bear after crushing the mouse. "She threatened my life."
The Prophet's Song
The Prophet's Song
Re: Linux Vulnerability Announced, Details Kept Secret
Yeah, I am not changing anything until I hear that I really should!mxethernut wrote: ↑Mon Sep 30, 2024 5:18 am @operadude: Looks like you do not want to disable the system.d cups-browsed service because you need your printers:Is itjoekamprad @EOS forum wrote:to check if you have it enabledCode: Select all
systemctl status cups-browsed
to stop/disable.Code: Select all
sudo systemctl disable --now cups-browsed
andCode: Select all
status cups-browsed.service
on Sysvinit? (Not using it b/c of sound issues)Code: Select all
sudo disable cups-browsed.service
Do you have ufw/gufw installed and running as a service? You can close port 631 with this firewall. It will protect this and all other ports by default.
ufw deny 631/tcp >> Please check https://docs.e2enetworks.com/guides/ufw.html, this is for system.d however.
Thanks for the command snippets, but I am using sysVinit, and thus no "systctl":
Code: Select all
$ systemctl status cups-browsed
System has not been booted with systemd as init system (PID 1). Can't operate.
Failed to connect to bus: Host is down
Code: Select all
$ systemctl status cups-browsed.service
System has not been booted with systemd as init system (PID 1). Can't operate.
Failed to connect to bus: Host is down
My ufw status:Do you have ufw/gufw installed and running as a service? You can close port 631 with this firewall. It will protect this and all other ports by default.
Code: Select all
$ sudo ufw status
[sudo] password for opera-dude:
Status: active

Re: Linux Vulnerability Announced, Details Kept Secret
karlchen wrote: ↑Mon Sep 30, 2024 5:59 am Hell, mxethernut-
Closing TCP port 631 is closing the CUPS port. I suspect this will prevent you from printing completely.mxethernut wrote: ↑Mon Sep 30, 2024 5:18 amDo you have ufw/gufw installed and running as a service? You can close port 631 with this firewall.Code: Select all
ufw deny 631/tcp
In order to prevent connecting to cups-browsed from outside you have to close UDP port 631.
In the most simple scenario you simply switch on ufw by executingThis will tell the MX software firewall to reject any incoming connection requests, including UDP port 631.Code: Select all
sudo ufw enable
Karl

Feeling better that I have "ufw" enabled (I think it's the default now)

Re: Linux Vulnerability Announced, Details Kept Secret
Code: Select all
Start-Date: 2024-09-30 01:10:34
Commandline: apt dist-upgrade
Requested-By: aika (1000)
Upgrade: libcups2:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-filters:amd64 (1.28.7-1+deb11u2, 1.28.7-1+deb11u3), cups-bsd:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-common:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-client:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-ppdc:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-daemon:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), libfontembed1:amd64 (1.28.7-1+deb11u2, 1.28.7-1+deb11u3), cups-filters-core-drivers:amd64 (1.28.7-1+deb11u2, 1.28.7-1+deb11u3), cups-ipp-utils:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-browsed:amd64 (1.28.7-1+deb11u2, 1.28.7-1+deb11u3), cups-core-drivers:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), cups-server-common:amd64 (2.3.3op2-3+deb11u8, 2.3.3op2-3+deb11u9), libcupsfilters1:amd64 (1.28.7-1+deb11u2, 1.28.7-1+deb11u3)
End-Date: 2024-09-30 01:11:20
My firewall was activated beforehand anyway:
Code: Select all
sudo ufw status verbose
[sudo] Passwort für aika:
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), disabled (routed)
New profiles: skip
To Action From
-- ------ ----
5060/udp ALLOW IN Anywhere
1720/tcp ALLOW IN Anywhere
39275/udp ALLOW IN Anywhere
...
- mxethernut
- Posts: 73
- Joined: Mon Jul 01, 2024 11:38 am
Re: Linux Vulnerability Announced, Details Kept Secret
Unsure, it might be. Is it?
Feeling better that I have "ufw" enabled (I think it's the default now)![]()
I remember Manjaro had it off by default
- mxethernut
- Posts: 73
- Joined: Mon Jul 01, 2024 11:38 am
Re: Linux Vulnerability Announced, Details Kept Secret
Yes you probably are.
Can you try:
Code: Select all
status cups-browsed
Code: Select all
status cups-browsed.service