[Pkg-cups-devel] Bug#692791: members of lpadmin can read every file on server via cups

Michael Sweet msweet at apple.com
Wed Nov 28 04:38:58 UTC 2012


After looking at this patch in detail, it doesn't actually prevent users in the lpadmin group from modifying cupsd.conf and performing the specified privilege escalation.

An alternate fix for cups-1.5 and earlier that specifically addresses the reported problem by requiring the log files to reside in CUPS_LOGDIR:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: alt-CVE-2012-5519.patch
Type: application/octet-stream
Size: 1074 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-cups-devel/attachments/20121127/cedb74f0/attachment.obj>
-------------- next part --------------


On 2012-11-27, at 9:30 AM, Marc Deslauriers <marc.deslauriers at canonical.com> wrote:

> FYI, as a security fix for our stable releases in Ubuntu, we plan on
> disabling cupsd.conf modification in the web interface entirely.
> Attached is the patch we plan on using.
> 
> Marc.
> <CVE-2012-5519.patch>

________________________________________________________________________
Michael Sweet, Senior Printing System Engineer, PWG Chair



More information about the Pkg-cups-devel mailing list