Moderate CentOS cups Security Update
|cups-1.4.2-67.el6.i686.rpm, cups-1.4.2-67.el6.src.rpm, cups-1.4.2-67.el6.x86_64.rpm, cups-devel-1.4.2-67.el6.i686.rpm, cups-devel-1.4.2-67.el6.x86_64.rpm, cups-libs-1.4.2-67.el6.i686.rpm, cups-libs-1.4.2-67.el6.x86_64.rpm, cups-lpd-1.4.2-67.el6.i686.rpm, cups-lpd-1.4.2-67.el6.x86_64.rpm, cups-php-1.4.2-67.el6.i686.rpm, cups-php-1.4.2-67.el6.x86_64.rpm|
Updated cups packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CUPS provides a portable printing layer for Linux, UNIX, and similar
A cross-site scripting (XSS) flaw was found in the CUPS web interface.
An attacker could use this flaw to perform a cross-site scripting attack
against users of the CUPS web interface. (CVE-2014-2856)
It was discovered that CUPS allowed certain users to create symbolic links
in certain directories under /var/cache/cups/. A local user with the 'lp'
group privileges could use this flaw to read the contents of arbitrary
files on the system or, potentially, escalate their privileges on the
system. (CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031)
The CVE-2014-3537 issue was discovered by Francisco Alonso of Red Hat
These updated cups packages also include several bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Enterprise Linux 6.6 Technical Notes, linked to in the
References section, for information on the most significant of these
All cups users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the cupsd daemon will be restarted automatically.
Please see https://www.redhat.com/footer/terms-of-use.html
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.Sign up for monitoring
Affected package information