A subtle ordering mistake in CUPS’ connection-handling code quietly opened a wide door for disruption: a use‑after‑free in the cupsdAcceptClient() path (tracked as CVE‑2023‑34241) can crash the printing daemon and, under some conditions, expose sensitive in‑process data — a practical...