cups is vulnerable to privilege escalation. The vulnerability exists due to gain elevated privileges which allows an attacker to authenticate to CUPS as root/admin without the 32-byte secret key.
github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0026/MNDT-2022-0026.md
github.com/OpenPrinting/cups/commit/de4f8c196106033e4c372dce3e91b9d42b0b9444
lists.debian.org/debian-lts-announce/2022/05/msg00039.html
lists.fedoraproject.org/archives/list/[email protected]/message/KQ6TD7F3VRITPEHFDHZHK7MU6FEBMZ5U/
lists.fedoraproject.org/archives/list/[email protected]/message/YQRIT4H75XV6M42K7ZTARWZ7YLLYQHPO/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
secdb.alpinelinux.org/v3.16/main.yaml
support.apple.com/en-us/HT213183
support.apple.com/en-us/HT213184
support.apple.com/en-us/HT213185
www.debian.org/security/2022/dsa-5149