fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

ricardo :mastodon:

OpenPrinting vulnerabilities

Use the following command to determine if cups-browsed is running:

$ sudo systemctl status cups-browsed

If the result includes "Active: inactive (dead)" then the exploit chain is halted and the system is not vulnerable

If the result is "running" or "enabled" then the system may be vulnerable.

Mitigation is simple, especially in any environment where printing is not needed.

$ sudo systemctl stop cups-browsed

$ sudo systemctl disable cups-browsed

@governa And to kill two birds with one stone:

sudo systemctl disable --now cups-browsed

sudo is not needed for status, BTW.

EDIT: while I have CUPS installed on my Arch system, cups-browsed is not present.

@governa funny you mention this. just noticed this. 😂 curious.

@governa Still kinda new to Linux. I'm thinking that a system at home behind a firewall isn't at risk. My router is well configured and the firmware is current. Do I need to disable cups on my laptop?

@tzudad you can restrict access to the CUPS service by configuring the firewall to block incoming connections to port 631 from untrusted sources. This can be done using the following command:

sudo ufw deny from any to any port 631

This will help mitigate the risk of exploitation until the CUPS service can be updated.

@governa you might also want to mask the unit so it can't get accidentally pulled in by something else as a dependency