FEDORA-2023-31cf6a7a1e
Packages in this update:
cups-filters-1.28.16-3.fc37
Update description:
2207970 – CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend
cups-filters-1.28.16-3.fc37
2207970 – CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend
The abuse methods require pre-existing access to a compromised user account or Teams token
eSentire recommended raising awareness of malware masquerading as legitimate applications
The claims come from the latest Searchlight Cyber threat intelligence report
Ken Muir has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story.
There’s good news if you’re plagued by shared Google Drive files from strangers.
Google Drive is getting a spam folder.
Google has announced a new policy on dealing with inactive accounts – and it’s an important read for anyone who doesn’t regularly login.
Read more in my article on the Hot for Security blog.
It was discovered that cups-filters incorrectly handled the beh CUPS
backend. A remote attacker could possibly use this issue to cause the
backend to stop responding or to execute arbitrary code.
cutter-re-2.2.1-1.fc37
rizin-0.5.2-1.fc37
rebase to rizin 0.5.2 and cutter 2.2.1
rebase rizin to v0.5.1 and cutter-re to 0.2.0
cutter-re-2.2.1-1.fc38
rizin-0.5.2-1.fc38.2
rebase to rizin 0.5.2 and cutter 2.2.1