git: c391dd71c614 - main - security/vuxml: Update cups-filters entry

From: Tijl Coosemans <tijl_at_FreeBSD.org>
Date: Wed, 02 Oct 2024 09:29:12 UTC
The branch main has been updated by tijl:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c391dd71c614d9a6be09b7cf19c98a87685c53fc

commit c391dd71c614d9a6be09b7cf19c98a87685c53fc
Author:     Tijl Coosemans <tijl@FreeBSD.org>
AuthorDate: 2024-10-02 09:26:16 +0000
Commit:     Tijl Coosemans <tijl@FreeBSD.org>
CommitDate: 2024-10-02 09:28:09 +0000

    security/vuxml: Update cups-filters entry
---
 security/vuxml/vuln/2024.xml | 24 ++++++++++++++----------
 1 file changed, 14 insertions(+), 10 deletions(-)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index f3ed777ed074..1cbd1a92f881 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -110,7 +110,11 @@
     <affects>
       <package>
 	<name>cups-filters</name>
-	<range><gt>0</gt></range>
+	<range><lt>1.28.17_6</lt></range>
+      </package>
+      <package>
+	<name>cups</name>
+	<range><lt>2.4.11</lt></range>
       </package>
     </affects>
     <description>
@@ -139,14 +143,14 @@
 	<p><code># service cups_browsed status<br />
 	  # service cups_browsed stop<br />
 	  # service cups_browsed disable</code></p>
-	<p>Attacks from the internet can be blocked by removing the "cups"
-	  protocol from the BrowseRemoteProtocols and BrowseProtocols
-	  directives in /usr/local/etc/cups/cups-browsed.conf. Attacks using
-	  mDNS can be blocked by removing the "dnssd" protocol as well. Access
-	  can be limited to specific IP addresses using BrowseAllow,
-	  BrowseDeny, and BrowseOrder directives as documented in
-	  cups-browsed.conf(5). Then restart the service with the following
-	  command:</p>
+	<p>If you choose to leave the service enabled, attacks from the
+	  internet can be blocked by removing the "cups" protocol from the
+	  BrowseRemoteProtocols and BrowseProtocols directives in
+	  /usr/local/etc/cups/cups-browsed.conf. Attacks using mDNS can be
+	  blocked by removing the "dnssd" protocol as well. Access can be
+	  limited to specific IP addresses using BrowseAllow, BrowseDeny, and
+	  BrowseOrder directives as documented in cups-browsed.conf(5). Then
+	  restart the service with the following command:</p>
 	<p><code># service cups_browsed restart</code></p>
 	</body>
     </description>
@@ -154,12 +158,12 @@
       <cvename>CVE-2024-47076</cvename>
       <cvename>CVE-2024-47175</cvename>
       <cvename>CVE-2024-47176</cvename>
-      <cvename>CVE-2024-47177</cvename>
       <url>https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8</url>
     </references>
     <dates>
       <discovery>2024-09-26</discovery>
       <entry>2024-09-27</entry>
+      <modified>2024-10-02</modified>
     </dates>
   </vuln>