Your message dated Fri, 27 Sep 2024 17:19:00 +0000 with message-id <e1sueco-00fqfq...@fasolo.debian.org> and subject line Bug#1082820: fixed in cups-filters 1.28.17-5 has caused the Debian Bug report #1082820, regarding cups-filters: CVE-2024-47176 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1082820: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: cups-filters Version: 1.28.17-3 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Hi, The following vulnerability was published for cups-filters. CVE-2024-47176[0]: | CUPS is a standards-based, open-source printing system, and `cups- | browsed` contains network printing functionality including, but not | limited to, auto-discovering print services and shared printers. | `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any | packet from any source, and can cause the `Get-Printer-Attributes` | IPP request to an attacker controlled URL. Due to the service | binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` | can be exploited in sequence to introduce a malicious printer to the | system. This chain of exploits ultimately enables an attacker to | execute arbitrary commands remotely on the target machine without | authentication when a print job is started. This poses a significant | security risk over the network. Notably, this vulnerability is | particularly concerning as it can be exploited from the public | internet, potentially exposing a vast number of systems to remote | attacks if their CUPS services are enabled. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-47176 https://www.cve.org/CVERecord?id=CVE-2024-47176 [1] https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 [2] https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore
--- End Message ---
--- Begin Message ---Source: cups-filters Source-Version: 1.28.17-5 Done: Thorsten Alteholz <deb...@alteholz.de> We believe that the bug you reported is fixed in the latest version of cups-filters, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1082...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thorsten Alteholz <deb...@alteholz.de> (supplier of updated cups-filters package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 26 Sep 2024 23:45:05 +0200 Source: cups-filters Architecture: source Version: 1.28.17-5 Distribution: unstable Urgency: medium Maintainer: Debian Printing Team <debian-printing@lists.debian.org> Changed-By: Thorsten Alteholz <deb...@alteholz.de> Closes: 1082820 1082827 Changes: cups-filters (1.28.17-5) unstable; urgency=medium . * CVE-2024-47076 (Closes: #1082827) cfGetPrinterAttributes5(): Validate response attributes before return * CVE-2024-47176 (Closes: #1082820) Default BrowseRemoteProtocols should not include "cups" protocol Checksums-Sha1: 7de99a3d0be8ff22226c2caa7367f979443d2f40 3028 cups-filters_1.28.17-5.dsc 9a634c2b4ffdee0592a036d6a177620b9296f368 87272 cups-filters_1.28.17-5.debian.tar.xz 98f75ea17906994ef3965048a21a213ed41892cb 14940 cups-filters_1.28.17-5_amd64.buildinfo Checksums-Sha256: 793f03ff6966dcbff5a5ac168caef371d0bd256c247f0de12b8499f9efefaa00 3028 cups-filters_1.28.17-5.dsc 017e50735002802f0ab45185610371a1b55d08b20e8af6936216d0350b97c82e 87272 cups-filters_1.28.17-5.debian.tar.xz 07c23eda9af0528efbe9b825fb63b19ec8a1381be8f319162c9e8f4f816800bf 14940 cups-filters_1.28.17-5_amd64.buildinfo Files: bdb1f8a14c9099fbf755b00eb6e483c0 3028 net optional cups-filters_1.28.17-5.dsc 4f4b6560c752e34a386bf0c79312032c 87272 net optional cups-filters_1.28.17-5.debian.tar.xz dcfec29c9b2a05d21d5203385cdea883 14940 net optional cups-filters_1.28.17-5_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQKnBAEBCgCRFiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmb25c1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcTHGRlYmlhbkBh bHRlaG9sei5kZQAKCRCW/KwNOHtYR6ZAD/9EhhVqvD3NXxThg+lKYYTRTfyA5/Oo fwp+jw/o58XeWSYuIdGQOc20/jNSK9alUp5p17RjWVOCymQ0v7O2PxS+162dz2cI SCTH0rCeMtHEwB1ZGsQNWiaKq98FT6RtK5egPL4gP0ZmEOe4RQJM75z134jp90u2 kqQF0PwV/bDDOZYjEOUPowTeMnzZQvbPY81r/UIamlEqTMYTG5y2IeoeXcAKW1J9 7O8zlaEq/WqPSF8tfbIbJgk0+C8oUJpDT54bKCAtWtaFlmGwy2wm2inYl/L5IKEN u3oa8PP6aihfVq6v3kHzR7J4bDjuF4oEd/ZS4ip3horw/uuHo9kkCDpeBYr5SaHg be7lqEfoVWv6G4NhoEUS4DiUEcwbcExw/XkUGB5HCaPcppEAhl7ugauN+ZZFWIpy hXmk5MXKR8mVXLKpCqfLME/8uSIvLkJQg/3R3r9rjzCY+9dMToMwlfhHVUERzYtI mJ5hXMas2S8UJYYMs4H8uPUeCDcKK2nHUItJuQwbiwu14ipeVMzPr01juuuF8703 HFpRBYp8RiNZdOVPHdnPzcs1sjlre6aNUa1AFpnBd26nxxA2aFvwAcLtGyVODvZF ql1cAsgoajtUseJvOP40QQi4gUBnQ+nAKhj+pSA2CXPEYJGxL0hm8Xwj4c2ohrFf mcUhnobWDJjSHA== =yFIK -----END PGP SIGNATURE-----pgpb16mpO9yMx.pgp
Description: PGP signature
--- End Message ---