git: c391dd71c614 - main - security/vuxml: Update cups-filters entry
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 02 Oct 2024 09:29:12 UTC
The branch main has been updated by tijl: URL: https://cgit.FreeBSD.org/ports/commit/?id=c391dd71c614d9a6be09b7cf19c98a87685c53fc commit c391dd71c614d9a6be09b7cf19c98a87685c53fc Author: Tijl Coosemans <tijl@FreeBSD.org> AuthorDate: 2024-10-02 09:26:16 +0000 Commit: Tijl Coosemans <tijl@FreeBSD.org> CommitDate: 2024-10-02 09:28:09 +0000 security/vuxml: Update cups-filters entry --- security/vuxml/vuln/2024.xml | 24 ++++++++++++++---------- 1 file changed, 14 insertions(+), 10 deletions(-) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index f3ed777ed074..1cbd1a92f881 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -110,7 +110,11 @@ <affects> <package> <name>cups-filters</name> - <range><gt>0</gt></range> + <range><lt>1.28.17_6</lt></range> + </package> + <package> + <name>cups</name> + <range><lt>2.4.11</lt></range> </package> </affects> <description> @@ -139,14 +143,14 @@ <p><code># service cups_browsed status<br /> # service cups_browsed stop<br /> # service cups_browsed disable</code></p> - <p>Attacks from the internet can be blocked by removing the "cups" - protocol from the BrowseRemoteProtocols and BrowseProtocols - directives in /usr/local/etc/cups/cups-browsed.conf. Attacks using - mDNS can be blocked by removing the "dnssd" protocol as well. Access - can be limited to specific IP addresses using BrowseAllow, - BrowseDeny, and BrowseOrder directives as documented in - cups-browsed.conf(5). Then restart the service with the following - command:</p> + <p>If you choose to leave the service enabled, attacks from the + internet can be blocked by removing the "cups" protocol from the + BrowseRemoteProtocols and BrowseProtocols directives in + /usr/local/etc/cups/cups-browsed.conf. Attacks using mDNS can be + blocked by removing the "dnssd" protocol as well. Access can be + limited to specific IP addresses using BrowseAllow, BrowseDeny, and + BrowseOrder directives as documented in cups-browsed.conf(5). Then + restart the service with the following command:</p> <p><code># service cups_browsed restart</code></p> </body> </description> @@ -154,12 +158,12 @@ <cvename>CVE-2024-47076</cvename> <cvename>CVE-2024-47175</cvename> <cvename>CVE-2024-47176</cvename> - <cvename>CVE-2024-47177</cvename> <url>https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8</url> </references> <dates> <discovery>2024-09-26</discovery> <entry>2024-09-27</entry> + <modified>2024-10-02</modified> </dates> </vuln>