somtwo@lemmy.worldtoLinux@lemmy.ml•The CUPS explout is here: GitHub - RickdeJager/cupshax
4·
2 months agoFrom what I understand, this allows arbitrary command execution. So, an attacker can specify a string of text that something on the affected system will just plop into a command line and execute.
Mind giving a summary for the rest of us?