{"id":34931,"date":"2024-10-08T14:09:47","date_gmt":"2024-10-08T06:09:47","guid":{"rendered":"https:\/\/www.deepin.org\/?p=34931"},"modified":"2024-10-21T10:09:49","modified_gmt":"2024-10-21T02:09:49","slug":"deepin-fixes-cups-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/deepin-fixes-cups-security-vulnerabilities\/","title":{"rendered":"CUPS Multiple High-Risk Security Vulnerabilities: How Does deepin Respond?"},"content":{"rendered":"<img loading=\"lazy\" class=\"alignnone size-full wp-image-34933\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29.png\" alt=\"\" width=\"900\" height=\"383\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29.png 900w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-300x128.png 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-150x64.png 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-768x327.png 768w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-24x10.png 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-36x15.png 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2024\/10\/\u91cd\u78c5\u65b0\u95fb\u4e25\u8083\u79d1\u6280\u98ce\u6241\u5e73\u7b80\u7ea6\u516c\u4f17\u53f7\u9996\u56fe__2024-10-0814_02_29-48x20.png 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>On September 27, 2024, security researcher Simone \"evilsocket\" Margaritelli reported on his personal blog that the Unix-based printing framework CUPS has multiple high-risk security vulnerabilities<sup>[1]<\/sup>. Unauthenticated remote attackers can impersonate printers, using malicious IPP URLs to replace the URLs of existing printers or add new malicious printers. In this scenario, when a user initiates a print job from the affected computer, attackers can silently execute arbitrary commands on that computer through the fake printer URL, thereby achieving the attack.<\/p>\n<p>These vulnerabilities have been confirmed by the upstream software maintainers and security personnel, and temporary measures have been taken to disable the relevant features to mitigate the risks. No functional fixes are currently provided.<\/p>\n<p>Vulnerability IDs: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177. <sup>[2][3][4]<\/sup><\/p>\n<p>&nbsp;<\/p>\n<section>\n<section>\n<section>\n<h1 style=\"text-align: center;\"><strong>Am I affected?<\/strong><\/h1>\n<p>1\u3001If you have not installed cups-browsed (this package is not pre-installed in deepin 23), you are not affected by this vulnerability.<\/p>\n<p>2\u3001If you do not perform any printing operations, you will not trigger this vulnerability.<\/p>\n<p>3\u3001If you have installed cups-browsed and perform printing operations, you may be affected by this vulnerability.<\/p>\n<p>&nbsp;<\/p>\n<\/section>\n<\/section>\n<\/section>\n<h1 style=\"text-align: center;\"><strong>Temporary protection measures<\/strong><\/h1>\n<p>1\u3001<strong>If you do not need the cups-browsed service<\/strong>, stopping or uninstalling the cups-browsed service can mitigate attacks over the network:<\/p>\n<p>a. <code class=\"inlineCode___uUrJ9\">sudo systemctl disable --now cups-browsed<\/code><\/p>\n<p>b. <code class=\"inlineCode___uUrJ9\">sudo apt remove cups-browsed<\/code><\/p>\n<p>&nbsp;<\/p>\n<p>2\u3001<strong>If you need the cups-browsed service,<\/strong> you can:<\/p>\n<p>a. Enable the firewall to block UDP 631 port traffic to prevent attacks.<\/p>\n<p>b. Edit\u00a0 \/etc\/cups\/cups-browsed.conf, search for the BrowseRemoteProtocols field, remove cups and execute <code class=\"inlineCode___uUrJ9\">sudo systemctl restart cups-browsed<\/code> to restart cups-browsed.<\/p>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center;\"><strong>deepin 23 Patch<\/strong><\/h1>\n<p>deepin 23 has patched cups-browsed and cups-filters on September 27, 2024. We strongly recommend that all users update immediately to fix this security vulnerability. The patched version is: 1.28.17-3.1~deepin3.<\/p>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center;\"><strong>Event Timeline<\/strong><\/h1>\n<ul>\n<li>September 27, 2024, 04:00 (UTC+8) Vulnerability disclosure.<\/li>\n<li>September 27, 2024, 09:00 (UTC+8) deepin detected the vulnerability information.<\/li>\n<li>September 27, 2024, 11:44 (UTC+8) Vulnerability patched and integrated.<\/li>\n<li>September 27, 2024, 14:18 (UTC+8) Integration testing passed.<\/li>\n<li>September 27, 2024, 15:42 (UTC+8) Repository pushed the vulnerability fix.<\/li>\n<\/ul>\n<p>(All times are Beijing Time)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>References:<\/strong><\/p>\n[1] Blog address: <a href=\"https:\/\/www.evilsocket.net\/2024\/09\/26\/Attacking-UNIX-systems-via-CUPS-Part-I\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.evilsocket.net\/2024\/09\/26\/Attacking-UNIX-systems-via-CUPS-Part-I\/<\/a><\/p>\n[2] Alibaba Cloud report: <a href=\"https:\/\/avd.aliyun.com\/detail?id=AVD-2024-47176\" target=\"_blank\" rel=\"noopener\">https:\/\/avd.aliyun.com\/detail?id=AVD-2024-47176<\/a><\/p>\n[3] JFrog report: <a href=\"https:\/\/jfrog.com\/blog\/cups-attack-zero-day-vulnerability-all-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">https:\/\/jfrog.com\/blog\/cups-attack-zero-day-vulnerability-all-you-need-to-know\/<\/a><\/p>\n[4] oss-security report: <a class=\"last-node\" href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/09\/26\/5\" target=\"_blank\" rel=\"noopener\">https:\/\/www.openwall.com\/lists\/oss-security\/2024\/09\/26\/5<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h1><strong>Releated Reading\uff1a<\/strong><\/h1>\n<p>\uff081\uff09<a href=\"https:\/\/distrowatch.com\/index.php?distribution=deepin\">deepin Full Version Image Downloads (including deepin V15)<\/a><\/p>\n<p>\uff082\uff09<a href=\"https:\/\/www.deepin.org\/en\/deepin-en-espanol-introduction\/\">deepin en Espa\u00f1ol Community<\/a><\/p>\n<p>\uff083\uff09<a href=\"https:\/\/www.deepin.org\/en\/why-is-there-no-deepin-24\/\">Why is there no deepin 24<\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\">Content source: deepin community<\/p>\n<p style=\"text-align: right;\">Reprinted with attribution<\/p>","protected":false},"excerpt":{"rendered":"<p>On September 27, 2024, security researcher Simone \"evilsocket\" Margaritelli reported on his personal blog that the Unix-based printing framework CUPS has multiple high-risk security vulnerabilities[1]. Unauthenticated remote attackers can impersonate printers, using malicious IPP URLs to replace the URLs of existing printers or add new malicious printers. In this scenario, when a user initiates a print job from the affected computer, attackers can silently execute arbitrary commands on that computer through the fake printer URL, thereby achieving the attack. These vulnerabilities have been confirmed by the upstream software maintainers and security personnel, and temporary measures have been taken to disable ...<a href=https:\/\/www.deepin.org.cn\/en\/deepin-fixes-cups-security-vulnerabilities\/>Read more<\/a><\/p>\n","protected":false},"author":11164,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[93],"tags":[144,153,148,141,147,143],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/34931"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/11164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=34931"}],"version-history":[{"count":6,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/34931\/revisions"}],"predecessor-version":[{"id":34939,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/34931\/revisions\/34939"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=34931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=34931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=34931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}