minus-squaresomtwo@lemmy.worldtoLinux@lemmy.ml•The CUPS explout is here: GitHub - RickdeJager/cupshaxlinkfedilinkarrow-up4·1 month agoFrom what I understand, this allows arbitrary command execution. So, an attacker can specify a string of text that something on the affected system will just plop into a command line and execute. linkfedilink
From what I understand, this allows arbitrary command execution. So, an attacker can specify a string of text that something on the affected system will just plop into a command line and execute.