Affected: LinuxMint, Ubuntu, MXLinux, KDE Neon and many other distro’s and server editions.
CVE-2024-47076
https://nvd.nist.gov/vuln/detail/CVE-2024-47076
CVE-2024-47176
https://nvd.nist.gov/vuln/detail/CVE-2024-47176
This poses a significant security risk over the network. Notably, *this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled.
* my bolding for emphasis
Patches issued 2024-09-29 by debian security team.
Very unusual for any debian updates over the weekend unless a security issue.
Received 2 patches to update to the following within the hour.
cups 2.4.2-3+deb12u8
cups-browsed 1.28.17-3+deb12u1
cups-bsd 2.4.2-3+deb12u8
cups-client 2.4.2-3+deb12u8
cups-common 2.4.2-3+deb12u8
cups-core-drivers 2.4.2-3+deb12u8
cups-daemon 2.4.2-3+deb12u8
cups-filters 1.28.17-3+deb12u1
cups-filters-core-drivers 1.28.17-3+deb12u1
cups-ipp-utils 2.4.2-3+deb12u8
cups-ppdc 2.4.2-3+deb12u8
cups-server-common 2.4.2-3+deb12u8
libcups2 2.4.2-3+deb12u8
libcupsfilters1 1.28.17-3+deb12u1
libcupsimage2 2.4.2-3+deb12u8
libfontembed1 1.28.17-3+deb12u1
Check and update your Linux distro ASAP using the proprietary
updater, CLI commands, synaptic or similar.