Accepting request 222281 from home:jsmeix:branches:Printing
CUPS security fix for CVE-2012-5519 to have better default protection against misuse of CUPS admin privileges (bnc#789566) plus clean up of cups.spec by having strictly separated sections how cupsd is launched (either via SysVinit or via systemd) OBS-URL: https://build.opensuse.org/request/show/222281 OBS-URL: https://build.opensuse.org/package/show/Printing/cups?expand=0&rev=276
This commit is contained in:
54
cups.changes
54
cups.changes
@@ -1,3 +1,57 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 12 11:53:45 CET 2014 - jsmeix@suse.de
|
||||
|
||||
- Added Begin/End comments in scriptlets for RPM macros
|
||||
so that it is easier to see in the "rpm -q --scripts cups"
|
||||
output what each RPM macro actually does.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 12 10:30:42 CET 2014 - jsmeix@suse.de
|
||||
|
||||
- Clean up how cupsd is launched (via SysVinit or systemd)
|
||||
by maintaining strictly separated sections in cups.spec:
|
||||
Either for launching cupsd via systemd (if have_systemd is set)
|
||||
or for launching cupsd via SysVinit (if have_systemd is not set).
|
||||
SysVinit support cannot be removed because CUPS 1.5.4
|
||||
is provided for SLE11 in the OBS devel project "Printing".
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 5 14:04:42 CET 2014 - jsmeix@suse.de
|
||||
|
||||
- cups-1.5.4-CVE-2012-5519.patch adds better default protection
|
||||
against misuse of privileges by normal users who have been
|
||||
specifically allowed by root to do cupsd configuration changes
|
||||
(CUPS STR#4223 CVE-2012-5519 Novell/Suse Bugzilla bnc#789566).
|
||||
The new ConfigurationChangeRestriction cupsd.conf directive
|
||||
specifies the level of restriction for cupsd.conf changes
|
||||
that happen via HTTP/IPP requests to the running cupsd
|
||||
(e.g. via CUPS web interface or via the cupsctl command).
|
||||
By default certain cupsd.conf directives that deal with
|
||||
filenames, paths, and users can no longer be changed via
|
||||
requests to the running cupsd but only by manual editing
|
||||
the cupsd.conf file and its default file permissions
|
||||
permit only root to write the cupsd.conf file.
|
||||
Those directives are: ConfigurationChangeRestriction,
|
||||
AccessLog, BrowseLDAPCACertFile, CacheDir, ConfigFilePerm,
|
||||
DataDir, DocumentRoot, ErrorLog, FatalErrors, FileDevice,
|
||||
FontPath, Group, JobPrivateAccess, JobPrivateValues,
|
||||
LogFilePerm, PageLog, Printcap, PrintcapFormat, PrintcapGUI,
|
||||
RemoteRoot, RequestRoot, ServerBin, ServerCertificate,
|
||||
ServerKey, ServerRoot, StateDir, SubscriptionPrivateAccess,
|
||||
SubscriptionPrivateValues, SystemGroup, SystemGroupAuthKey,
|
||||
TempDir, User, WebInterface.
|
||||
- The default group of users who are allowed to do cupsd
|
||||
configuration changes via requests to the running cupsd
|
||||
(i.e. the SystemGroup directive in cupsd.conf) is set
|
||||
to 'root' only.
|
||||
- In this context a general security advice:
|
||||
When root allows normal users to do system administration tasks
|
||||
(in particular when root allows normal users to administer
|
||||
system processes - i.e. processes that run as root), then
|
||||
this or that kind of privilege escalation will be possible.
|
||||
Only trustworthy users who do not misuse their privileges
|
||||
may get allowed to do specific system administration tasks.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 29 14:27:52 CET 2014 - jsmeix@suse.de
|
||||
|
||||
|
Reference in New Issue
Block a user