Moderate CentOS cups Security Update


cups-1.4.2-67.el6.i686.rpm, cups-1.4.2-67.el6.src.rpm, cups-1.4.2-67.el6.x86_64.rpm, cups-devel-1.4.2-67.el6.i686.rpm, cups-devel-1.4.2-67.el6.x86_64.rpm, cups-libs-1.4.2-67.el6.i686.rpm, cups-libs-1.4.2-67.el6.x86_64.rpm, cups-lpd-1.4.2-67.el6.i686.rpm, cups-lpd-1.4.2-67.el6.x86_64.rpm, cups-php-1.4.2-67.el6.i686.rpm, cups-php-1.4.2-67.el6.x86_64.rpm,
2018-01-18 11:08
2017-07-27 19:07
2017-04-01 19:08
2017-01-05 20:12


Updated cups packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

CUPS provides a portable printing layer for Linux, UNIX, and similar
operating systems.

A cross-site scripting (XSS) flaw was found in the CUPS web interface.
An attacker could use this flaw to perform a cross-site scripting attack
against users of the CUPS web interface. (CVE-2014-2856)

It was discovered that CUPS allowed certain users to create symbolic links
in certain directories under /var/cache/cups/. A local user with the 'lp'
group privileges could use this flaw to read the contents of arbitrary
files on the system or, potentially, escalate their privileges on the
system. (CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031)

The CVE-2014-3537 issue was discovered by Francisco Alonso of Red Hat
Product Security.

These updated cups packages also include several bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Enterprise Linux 6.6 Technical Notes, linked to in the
References section, for information on the most significant of these

All cups users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the cupsd daemon will be restarted automatically.
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 cups cups-1.4.2-67.el6.i686.rpm
cups cups-1.4.2-67.el6.src.rpm
cups cups-1.4.2-67.el6.x86_64.rpm
cups-devel cups-devel-1.4.2-67.el6.i686.rpm
cups-devel cups-devel-1.4.2-67.el6.x86_64.rpm
cups-libs cups-libs-1.4.2-67.el6.i686.rpm
cups-libs cups-libs-1.4.2-67.el6.x86_64.rpm
cups-lpd cups-lpd-1.4.2-67.el6.i686.rpm
cups-lpd cups-lpd-1.4.2-67.el6.x86_64.rpm
cups-php cups-php-1.4.2-67.el6.i686.rpm
cups-php cups-php-1.4.2-67.el6.x86_64.rpm