Amazon Linux 1 Security Advisory: ALAS-2013-170
Advisory Release Date: 2013-03-14 22:04 Pacific
Advisory Updated Date: 2014-09-15 22:40 Pacific
It was discovered that CUPS administrative users (members of the SystemGroups groups) who are permitted to perform CUPS configuration changes via the CUPS web interface could manipulate the CUPS configuration to gain unintended privileges. Such users could read or write arbitrary files with the privileges of the CUPS daemon, possibly allowing them to run arbitrary code with root privileges. (CVE-2012-5519)
After installing this update, the ability to change certain CUPS configuration directives remotely will be disabled by default. The newly introduced ConfigurationChangeRestriction directive can be used to enable the changing of the restricted directives remotely.
Affected Packages:
cups
Issue Correction:
Run yum update cups to update your system.
i686:
cups-debuginfo-1.4.2-50.18.amzn1.i686
cups-libs-1.4.2-50.18.amzn1.i686
cups-devel-1.4.2-50.18.amzn1.i686
cups-lpd-1.4.2-50.18.amzn1.i686
cups-php-1.4.2-50.18.amzn1.i686
cups-1.4.2-50.18.amzn1.i686
src:
cups-1.4.2-50.18.amzn1.src
x86_64:
cups-1.4.2-50.18.amzn1.x86_64
cups-devel-1.4.2-50.18.amzn1.x86_64
cups-php-1.4.2-50.18.amzn1.x86_64
cups-debuginfo-1.4.2-50.18.amzn1.x86_64
cups-lpd-1.4.2-50.18.amzn1.x86_64
cups-libs-1.4.2-50.18.amzn1.x86_64