Oh no!
The Register has begun putting "this" in headlines
In the latest chapter on leaky CUPS, a security researcher and his band of bug-hunting agents have found two flaws that can be chained to allow an unauthenticated attacker to remotely execute code and achieve root file overwrite on the network. CUPS - or the Common Unix Printing System, as it is less commonly known - is the …
Well given the huge IT stories El Reg has repeated ignored over the past few weeks, it's a good thing there are other forums around.
And it's a sad day when the BBCs coverage is broader than El Reg. Something I would not have said 3 years ago.
Let' see if this comment get's deleted ....
#BusinessInterests
... huge IT stories El Reg has repeated ignored ...
Don't know about huge, repeated (?) or even repeatedly.
But ignored implies willful action.
Seriously, now.
ElReg has been my go-to IT publication for the last 13 years or so and in my view, I do not think ignored would be the case.
That said, I have not seen / read anything about CVE-2026-29111 and CVE-2026-3888.
Maybe it slipped by ElReg, by me or they are not important enough to report on.
Worst case?
Shit happens, everywhere.
Both at ElReg and while travelling in a tin can 406,771 km from Mother Earth.
.
Not a single article on the seismic story about Meta etc being found liable in CA. If you rely on El Reg that never happened.
https://www.bbc.co.uk/news/articles/c747x7gz249o
There have been others. How about the story about a bot that got stroppy when it's Wiki edits were pulled ?
https://www.malwarebytes.com/blog/ai/2026/04/wikipedias-ai-agent-row-likely-just-the-beginning-of-the-bot-ocalypse
This post has been deleted by its author
...If I don't have a printer installed why does my entire desktop depend on it? Seriously. Install any given Linux desktop and then uninstall CUPS. You will be left with a box that only runs a CLI. That's great if your last name is Torvalds but the rest of us use a hell if more than the command line.
Because print-to-pdf is a feature supported by almost every application? OK, I dunno why that would need CUPS but I can see why "printing" per se is always there even if you have no hardware.
And print to pdf is very useful, you can then mess with it and share eg. tickets to your phone via google drive. &c &c
> why that would need CUPS
Because CUPS, with its drivers and filters installed, provides a conversion to PDF, a single path that all the desktop programs can use. They *could* all implement PDF/Postscript generation without calling CUPS but from their p.o.v. that is duplicated effort. And if you've installed all the office-style apps, having a default CUPS installed, even without a physical printer, isn't a killer overhead.
No but it's a big and complex system that has lots of networking, remote execution and low level driver access, is ubiquitous and has been 'in the wild' for decades which means it has to be a prime source of unknown exploits
Just size on disk isnt the main concern if you're managing a secure environment
Just shared printers became common in non-environment business as well, since many home routers and NAS today may run CUPS as well.
And still, the fact it makes businesses vulnerable is not secondary - although probably many run Windows print servers (which are not without issues too).
there's an exploit in the linux DHCP.. that no one seems to have spotted yet.
I saw it in china, when a staff member walked in with a mobile phone, that was able to leverage the DHCP server ,take it down and then replace it with a "malicious" version
hosted on the phone.
haven't had time to look at it fully yet.