FERRAMENTAS LINUX: Fedora 42 Security Update: Critical golang-ipp-usb Patch Fixes Memory Exhaustion Flaws

sábado, 8 de novembro de 2025

Fedora 42 Security Update: Critical golang-ipp-usb Patch Fixes Memory Exhaustion Flaws

 

Fedora


Fedora 42 security update: Learn how the golang-github-openprinting-ipp-usb patch fixes critical CVEs, including memory exhaustion and information leakage flaws. Secure your system now.

A new security update for Fedora 42 addresses multiple vulnerabilities in the golang-github-openprinting-ipp-usb package, which could lead to memory exhaustion attacks and information disclosure. 

This patch, released in advisory FEDORA-2025-d9921d4ed5, is a rebuild with the latest Go toolchain to resolve critical security flaws documented in three separate CVEs. 

System administrators are urged to apply this update promptly to protect systems from potential denial-of-service attacks and exposure of sensitive information .

This update reinforces the security of a key component in the modern Linux printing stack. The ipp-usb package acts as an HTTP reverse proxy, enabling driverless support for USB printers and scanners via the IPP-over-USB protocol. This technology allows devices to work seamlessly without manufacturer-specific drivers, making the printing setup instant on systems like the latest Fedora releases .

What is ipp-usb and Driverless Printing?

To understand the context of this security update, it's helpful to know what ipp-usb does. In simple terms, ipp-usb acts as a bridge that allows your computer to communicate with modern USB printers using the same Internet Printing Protocol (IPP) typically used for network printers.

This is part of the broader shift toward driverless printing, where printers advertise their own capabilities and require no manufacturer-specific software to be installed on the client machine. This technology, which relies on standards like AirPrint and IPP Everywhere, has become the foundation for plug-and-play printing in modern Linux distributions .

The ipp-usb daemon claims the USB interface of compatible devices, provides printing (via IPP), scanning (via eSCL), and fax support, and then advertises these services on the local machine via mDNS. This allows other services like CUPS (the Common UNIX Printing System) and sane-airscan (for scanning) to automatically discover and use the device without any manual configuration .

Vulnerabilities Patched in This Update

The rebuild of the golang-github-openprinting-ipp-usb package with the latest Go compiler directly addresses three significant security vulnerabilities in the Go libraries it depends on. The table below summarizes the patched CVEs:

CVE IdentifierSeverity & ImpactAffected Go Component
CVE-2025-58185 Memory exhaustion via crafted DER payloadencoding/asn1
CVE-2025-61723 Performance degradation via quadratic complexity attackencoding/pem
CVE-2025-58189 Information leak via ALPN error messagescrypto/tls

Detailed Breakdown of the Security Flaws

  1. CVE-2025-58185: ASN.1 Memory Exhaustion
    This vulnerability resided in Go's encoding/asn1 package. An attacker could send a specially crafted DER (Distinguished Encoding Rules) payload that, when parsed, would cause the application to allocate excessive amounts of memory. This could lead to a denial-of-service condition by exhausting the available memory on the system, causing the ipp-usb service or the entire machine to become unresponsive .

  2. CVE-2025-61723: PEM Parsing Quadratic Complexity
    This flaw was found in Go's encoding/pem package. By providing a specifically invalid PEM input, an attacker could trigger an algorithm with quadratic time complexity during parsing. This means that a small, malicious input could cause a disproportionately large consumption of CPU resources, again leading to a potential denial-of-service by making the service unusably slow .

  3. CVE-2025-58189: TLS ALPN Information Leak
    This vulnerability in Go's crypto/tls package concerned error messages during ALPN (Application-Layer Protocol Negotiation). The error messages generated contained input that was controlled by the attacker. This could potentially expose internal state information or details about the service's configuration, providing valuable intelligence for further, more targeted attacks .

Step-by-Step Update Instructions for Fedora 42

Applying this critical security patch is a straightforward process using the dnf package manager. The following steps will secure your system:

  1. Open a terminal window.

  2. Execute the update command. Run the following command to install the specific advisory:

    bash
    su -c 'dnf upgrade --advisory FEDORA-2025-d9921d4ed5'
  3. Authenticate. Enter your root password when prompted.

  4. Review and confirm. dnf will present a list of packages to be updated. Verify that golang-github-openprinting-ipp-usb is included and type y to confirm and proceed with the installation .

For general system maintenance, you can also update all packages with sudo dnf upgrade. All packages are signed with the Fedora Project GPG key, ensuring their authenticity and integrity .

Best Practices for Linux System Security

Beyond applying this specific update, maintaining a secure Linux system requires a proactive approach. How can you minimize your risk exposure from vulnerabilities in core system components?

  • Enable Automatic Updates: For desktop systems, consider configuring automatic security updates to ensure you receive patches as soon as they are available.

  • Regular Manual Checks: For servers, maintain a regular schedule (e.g., weekly) to manually check for and apply updates.

  • Subscribe to Security Feeds: Follow official security announcements from your distribution. The Fedora Project provides security updates through its package-announce mailing list, which is a primary source for advisories like this one .

  • Understand Your Stack: Having a basic understanding of what packages like ipp-usb do on your system helps you assess the impact and urgency of security notifications.

The Future of Printing and Security in Linux

The integration of ipp-usb as a weak dependency for CUPS and sane-airscan in Fedora highlights the long-term industry shift towards universal, driverless printing. 

This move promises a future where printers "just work" out of the box, much like USB storage devices .

However, as this update demonstrates, this convenience also expands the attack surface. The ipp-usb package, by its nature, acts as a network-facing service (even if only on localhost) that parses complex protocols. 

This makes its security, and the security of the underlying Go libraries it is built upon, critically important for the overall security posture of a Linux system .

Frequently Asked Questions (FAQ)

Q1: My printer uses a traditional driver. Am I affected by this update?

A: While the ipp-usb package may not be actively used if you rely on a proprietary driver, the updated package is still installed as a weak dependency. Applying the update is a recommended security best practice for all Fedora 42 systems.

Q2: What is the difference between ipp-usb and the older ippusbxd?  

A: ippusbxd was an earlier, simpler implementation that relayed TCP connections directly to USB, which could lead to data corruption. ipp-usb is a more robust HTTP reverse proxy that fully understands the HTTP protocol, ensuring reliable transactions and better handling of printer web interfaces. It is now the recommended and widely adopted solution .

Q3: After updating, do I need to restart any services or my computer?

A: It is generally good practice to restart the ipp-usb service if it's running, though the update should typically handle this. A full system reboot is not strictly necessary but can help ensure all components are cleanly using the updated libraries.

Nenhum comentário:

Postar um comentário