Frank via plug on 30 Sep 2024 16:15:07 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] CUPS flaw |
https://ubuntu.com/blog/cups-remote-code-execution-vulnerability-fix-available - Frank On 9/30/24 7:06 PM, Chad Waters via plug wrote:
Its fixed in Debian https://security-tracker.debian.org/tracker/CVE-2024-47175 I dont understand why anyone would think its a good idea to have this listening by default *cough* avahi too *cough*.. On Monday, September 30th, 2024 at 5:53 PM, Rich Mingin \(PLUG\) via plug <plug@lists.phillylinux.org> wrote:I am wrong, I replied before checking my news sources, Ubuntu rolled out some updated packages yesterday (Sunday) that they claim address the CVE. I'd expect Mint/PopOS/etc machines to get those fixes now, if they're not middle-manning the Ubuntu repos. Everyone else, AFAIK, is working on fixes/updates and giving advice similar to what I did this morning (do not expose print related ports/services/etc to the internet!)___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug