Source: cups-filters
Version: 1.28.17-5
Severity: normal
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>


Hi Thorsten,

The following vulnerability was published for cups-filters.

No direct action needed, it's more to get a cross reference in BTS
about the issue, it can be closed once the problematic code is going
to be removed (AFAIU). The mitigations as already handled should be
enought so far.

CVE-2024-47850[0]:
| CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an
| arbitrary destination and port in response to a single IPP UDP
| packet requesting a printer to be added, a different vulnerability
| than CVE-2024-47176. (The request is meant to probe the new printer
| but can be used to create DDoS amplification attacks.)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-47850
    https://www.cve.org/CVERecord?id=CVE-2024-47850
[1] 
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8

Regards,
Salvatore

Reply via email to