On 2024-09-27 07:57, David C. Rankin wrote:
All,
There is a remote code execution bug in CUPS with no patch as of yet:
https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/
The article contains mitigation steps if you have a public facing (or untrusted local) CUPS server.
I followed this last night (20:00 UTC) when it was full disclosure. Part II will be interesting although maybe not for opensuse but rather from a security perspective. It will expose macos and airprint as vulnerable according to evilsocket (Simone Margaritelli). Did a little check with 1024 hosts on our network. 2 is exposed via the internet and port udp/631 and one is vulnerable. This is under Swedish conditions but if we extrapolate this 0.1% of the internet is vulnerable. -- /bengan