Post AmQ7KfM6na3MC71kMC by 9x0rg@mamot.fr
(DIR) More posts by 9x0rg@mamot.fr
(DIR) Post #AmQ7KfM6na3MC71kMC by 9x0rg@mamot.fr
2024-09-27T06:26:07Z
0 likes, 1 repeats
**Red Hat’s response to OpenPrinting CUPS vulnerabilities**`sudo systemctl status cups-browsed`If the result includes “Active: inactive (dead)”, the exploit chain is halted and the system is not vulnerable.If the result is “running” or “enabled,”and the “BrowseRemoteProtocols” directive contains “cups” in the configuration file /etc/cups/cups-browsed.conf, the system is vulnerable.`sudo systemctl stop cups-browsed``sudo systemctl disable cups-browsed`https://www.redhat.com/en/blog/red-hat-response-openprinting-cups-vulnerabilities#CUPS
(DIR) Post #AmQ7NlqD8sDPB4aUvw by tuxicoman@social.jesuislibre.net
2024-09-27T06:28:48Z
0 likes, 0 repeats
@9x0rg but is there a fix available?
(DIR) Post #AmQ7SbdqUUZwzb6rJI by 9x0rg@mamot.fr
2024-09-27T06:29:40Z
0 likes, 0 repeats
@tuxicoman Not that I am aware of yet.
(DIR) Post #AmQ8GVOZzKlg6DlM4O by tuxicoman@social.jesuislibre.net
2024-09-27T06:38:42Z
0 likes, 0 repeats
@9x0rg this may explain that current mitigation is to disable the feature.