Important CUPS Vulnerability Update in Mageia Security Advisory 2024-0227
Summary
When starting the cupsd server with a Listen configuration item pointing
to a symbolic link, the cupsd process can be caused to perform an
arbitrary chmod of the provided argument, providing world-writable
access to the target.
References
- https://bugs.mageia.org/show_bug.cgi?id=33293
- https://www.openwall.com/lists/oss-security/2024/06/11/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
Resolution
MGASA-2024-0227 - Updated cups packages fix security vulnerability
SRPMS
- 9/core/cups-2.4.6-1.2.mga9