First published: Thu May 11 2023(Updated: )
beh backend: Use execv() instead of system() - <a href="https://access.redhat.com/security/cve/CVE-2023-24805">CVE-2023-24805</a> If you use "beh" to create an accessible network printer, this security vulnerability can cause remote code execution. <a href="https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x">https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenPrinting CUPS-Filters |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2203051 is critical due to the potential for remote code execution.
To fix REDHAT-BUG-2203051, update the OpenPrinting cups-filters software to the latest version that addresses this vulnerability.
The systems affected by REDHAT-BUG-2203051 include those running the OpenPrinting cups-filters software.
If REDHAT-BUG-2203051 is exploited, an attacker can execute arbitrary code remotely on the affected system.
There are no known workarounds for REDHAT-BUG-2203051, so patching is essential to mitigate the risk.