Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#78548 - [cups-filters] 1:2.4.2-7 CVE-2023-24805 RCE through unsanitized "user" and "title" parameters in beh
Attached to Project:
Arch Linux
Opened by Pascal Ernster (hardfalcon) - Thursday, 18 May 2023, 16:27 GMT
Last edited by Levente Polyak (anthraxx) - Thursday, 18 May 2023, 18:09 GMT
Opened by Pascal Ernster (hardfalcon) - Thursday, 18 May 2023, 16:27 GMT
Last edited by Levente Polyak (anthraxx) - Thursday, 18 May 2023, 18:09 GMT
|
DetailsSummary: "If you use beh to create an accessible network printer, this security vulnerability can cause remote code execution."
For details, see https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x This has been assigned CVE-2023-24805, with a CVSS of 8.8. There's a fix for this in upstream's master branch, but sadly no new release yet: https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65 |
This task depends upon
Closed by Levente Polyak (anthraxx)
Thursday, 18 May 2023, 18:09 GMT
Reason for closing: Fixed
Additional comments about closing: 1.28.17-3
Thursday, 18 May 2023, 18:09 GMT
Reason for closing: Fixed
Additional comments about closing: 1.28.17-3