Moderate CentOS cups Security Update

Metadata

medium
5.0
cups-1.4.2-67.el6.i686.rpm, cups-1.4.2-67.el6.src.rpm, cups-1.4.2-67.el6.x86_64.rpm, cups-devel-1.4.2-67.el6.i686.rpm, cups-devel-1.4.2-67.el6.x86_64.rpm, cups-libs-1.4.2-67.el6.i686.rpm, cups-libs-1.4.2-67.el6.x86_64.rpm, cups-lpd-1.4.2-67.el6.i686.rpm, cups-lpd-1.4.2-67.el6.x86_64.rpm, cups-php-1.4.2-67.el6.i686.rpm, cups-php-1.4.2-67.el6.x86_64.rpm
CVE-2014-2856, CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031
rhn.redhat.com, lists.centos.org
2014-10-20
2017-07-27 19:07
ALAS-2014-438
CVE-2014-5030 cups
CVE-2014-3537 cups
CVE-2014-2856 cups
CVE-2014-5029 cups
CVE-2014-5031 cups
CVE-2014-5031
CVE-2014-3537
CVE-2014-5029
CVE-2014-2856
CVE-2014-5030
2017-04-01 19:08
2017-01-05 20:12

Description


Updated cups packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

CUPS provides a portable printing layer for Linux, UNIX, and similar
operating systems.

A cross-site scripting (XSS) flaw was found in the CUPS web interface.
An attacker could use this flaw to perform a cross-site scripting attack
against users of the CUPS web interface. (CVE-2014-2856)

It was discovered that CUPS allowed certain users to create symbolic links
in certain directories under /var/cache/cups/. A local user with the 'lp'
group privileges could use this flaw to read the contents of arbitrary
files on the system or, potentially, escalate their privileges on the
system. (CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031)

The CVE-2014-3537 issue was discovered by Francisco Alonso of Red Hat
Product Security.

These updated cups packages also include several bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Enterprise Linux 6.6 Technical Notes, linked to in the
References section, for information on the most significant of these
changes.

All cups users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the cupsd daemon will be restarted automatically.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 cups cups-1.4.2-67.el6.i686.rpm
cups cups-1.4.2-67.el6.src.rpm
cups cups-1.4.2-67.el6.x86_64.rpm
cups-devel cups-devel-1.4.2-67.el6.i686.rpm
cups-devel cups-devel-1.4.2-67.el6.x86_64.rpm
cups-libs cups-libs-1.4.2-67.el6.i686.rpm
cups-libs cups-libs-1.4.2-67.el6.x86_64.rpm
cups-lpd cups-lpd-1.4.2-67.el6.i686.rpm
cups-lpd cups-lpd-1.4.2-67.el6.x86_64.rpm
cups-php cups-php-1.4.2-67.el6.i686.rpm
cups-php cups-php-1.4.2-67.el6.x86_64.rpm