Skip to content

Commit 489d50f

Browse files
committed
libcupsfilters 2.1.0 release: Fixed line break
1 parent 6851fb7 commit 489d50f

1 file changed

Lines changed: 1 addition & 2 deletions

File tree

_posts/2024-10-19-libcupsfilters, libppd, cups-filters - 2.1.0 Releases including vulnerability fix.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ The fixes provided by these releases are sufficient to prevent the described exp
2424
- [CVE-2024-47176](https://www.cve.org/CVERecord?id=CVE-2024-47176): cups-browsed binds on `UDP INADDR_ANY:631` trusting any packet from any source to trigger a `get-printer-attributes` IPP request to an attacker-controlled URL ([GHSA](https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8))
2525
- [CVE-2024-47850](https://www.cve.org/CVERecord?id=CVE-2024-47850): cups-browsed (before 2.5b1?) will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added. The request is meant to probe the new printer but can be used to create DDoS amplification attacks (on non-printer devices). This is a different vulnerability than CVE-2024-47176 but the remedy is the same, turning off or removing legacy CUPS browsing support in cups-browsed ([GHSA](https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8))
2626

27-
[Preliminary fix turning off CUPS browsing in configuration file](https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c)
28-
27+
[Preliminary fix turning off CUPS browsing in configuration file](https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c)<BR>
2928
[Final fix removing CUPS browsing and LDAP support](https://github.com/OpenPrinting/cups-browsed/commit/1d1072a0de5)
3029

3130
### New features since 2.0.0

0 commit comments

Comments
 (0)