beh backend: Use execv() instead of system() - CVE-2023-24805 If you use "beh" to create an accessible network printer, this security vulnerability can cause remote code execution. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
Created cups-filters tracking bugs for this issue: Affects: fedora-all [bug 2207970]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:3429 https://access.redhat.com/errata/RHSA-2023:3429
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3423 https://access.redhat.com/errata/RHSA-2023:3423
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:3424 https://access.redhat.com/errata/RHSA-2023:3424
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:3428 https://access.redhat.com/errata/RHSA-2023:3428
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:3427 https://access.redhat.com/errata/RHSA-2023:3427
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:3426 https://access.redhat.com/errata/RHSA-2023:3426
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3425 https://access.redhat.com/errata/RHSA-2023:3425
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-24805