Re: Message in Debian (reproduced below).

See also:

<https://security-tracker.debian.org/tracker/CVE-2012-5519>

where there is this:

"Name   CVE-2012-5519
Description     CUPS 1.4.4, when running in certain Linux distributions 
such as Debian GNU/Linux, stores the web interface administrator key in 
/var/run/cups/certs/0 using certain permissions, which allows local users in 
the lpadmin group to read or write arbitrary files as root by leveraging the 
web interface."

I have:

$ ls -l /var/run/cups/certs/0
-r--r----- 1 root lpadmin 32 Jan 17 08:01 /var/run/cups/certs/0

I only have read about it today. Gentoo, Debian, Mageia, Mandriva, Ubuntu,
Red Hat (Fedora too?), all seem to be affected.

Should we do anything about it?

[]s,
Fernando

>From root@vmwdebian Thu Jan 10 07:21:07 2013
Envelope-to: root@vmwdebian
Delivery-date: Thu, 10 Jan 2013 07:21:07 -0300
Date: Thu, 10 Jan 2013 07:21:07 -0300
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Subject: =?utf-8?q?apt-listchanges=3A_not=C3=ADcias_para_VMWDebian?=
To: root@vmwdebian
From: root <root@vmwdebian>

cups (1.4.4-7+squeeze2) stable-security; urgency=high

  In order to mitigate a privilege escalation from the lpadmin to root
  (CVE-2012-5519), the /etc/cups/cupsd.conf configuration file is split
  in two configuration files:

  * /etc/cups/cupsd.conf can be edited by members of the lpadmin group
    through the cups web interface;
  * /etc/cups/cups-files.conf can only be edited by root;

  Many sensitive configuration statements can now only be set in
  cups-files.conf. No statements have been moved automatically. Please
  check the respective manpages.

 -- Didier Raboud <o...@debian.org>  Sat, 29 Dec 2012 12:33:27 +0100

-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-dev
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to