There has been an announcement of several linked CVE vulnerabilities for CUPS.
CVE-2024-47076 (libcupsfilters)
CVE-2024-47175 (libppd)
CVE-2024-47176 (cups-browsed)
CVE-2024-47177 (cups-filters)
The exploitation of the vulnerability requires a chained combination of the packages linked to each CVE.
IPFire does not have libppd installed or available.
Currently there are no fix patches available for these CVE’s…
The mitigation for the vulnerability is the following.
- If you have opened port 631 to the internet, then close it. This is good security practice anyway as the protocol using that port is not authenticated and should not really be opened up to the wider internet.
With the port closed then any attacker would have to have access directly on your local lan to be able to attempt the attack. - By default cups-browsed is not turned on, although it is installed. If you have turned cups-browsed on then turn it off.
Run the command/etc/rc.d/init.d/cups-browsed status
to see if it is running or not.
Then delete the cups-browsed binary at
/usr/sbin/cups-browsed
- Don’t print to an unknown printer that appears in the list of printers available. The vulnerability requires a user to select the printer that has been created.
I will submit a patch that removes the cups-browsed binary from the rootfile list of installed programs.
As soon as fix patches are provided they will be updated in IPFire.