That super-wazoo Linux 0day dropped.
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
Author claims an attacker can send a specially-crafted UDP packet to port 631, or send mDNS traffic on a LAN, to get RCE.
**THERE DOES NOT APPEAR TO BE A FIX**, meaning that, at least on the distributions I have checked, **UPDATING YOUR PACKAGES WILL NOT PATCH THIS VULNERABILITY.**
You should remove CUPS if you do not print from a given host, or at least ensure your firewall is only as permissive as it needs to be to enable the services you mean to host.