SUSE-SU-2013:1655-1: moderate: Security update for CUPS

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Nov 11 13:04:11 MST 2013


   SUSE Security Update: Security update for CUPS
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1655-1
Rating:             moderate
References:         #789566 #827109 
Cross-References:   CVE-2012-5519
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:


   The following security issue has been fixed in the CUPS
   print daemon  CVE-2012-5519:

   The patch adds better default protection against misuse of
   privileges by  normal users who have been specifically
   allowed by root to do cupsd  configuration changes

   The new ConfigurationChangeRestriction cupsd.conf directive
   specifies the  level of restriction for cupsd.conf changes
   that happen via HTTP/IPP  requests to the running cupsd
   (e.g. via CUPS web interface or via the  cupsctl command).

   By default certain cupsd.conf directives that deal with
   filenames, paths,  and users can no longer be changed via
   requests to the running cupsd but  only by manual editing
   the cupsd.conf file and its default file permissions
   permit only root to write the cupsd.conf file.

   Those directives are: ConfigurationChangeRestriction,
   AccessLog,  BrowseLDAPCACertFile, CacheDir, ConfigFilePerm,
   DataDir, DocumentRoot,  ErrorLog, FileDevice, FontPath,
   Group, LogFilePerm, PageLog, Printcap,  PrintcapFormat,
   PrintcapGUI, RemoteRoot, RequestRoot, ServerBin,
   ServerCertificate, ServerKey, ServerRoot, StateDir,
   SystemGroup,  SystemGroupAuthKey, TempDir, User.

   The default group of users who are allowed to do cupsd
   configuration  changes via requests to the running cupsd
   (i.e. the SystemGroup directive in  cupsd.conf) is set to
   'root' only.

   Additionally the following bug has been fixed:

   * strip trailing "@REALM" from username for Kerberos
   authentication (CUPS STR#3972 bnc#827109)

   Security Issue reference:

   * CVE-2012-5519
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-cups-8437

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-cups-8436

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-cups-8437

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-cups-8437

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-cups-8436

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-cups-8436

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-cups-8437

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-cups-8436

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      cups-devel-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      cups-devel-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      cups-libs-x86-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Server 11 SP2 (ia64):

      cups-libs-x86-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      cups-1.3.9-8.46.48.1
      cups-client-1.3.9-8.46.48.1
      cups-libs-1.3.9-8.46.48.1

   - SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

      cups-libs-32bit-1.3.9-8.46.48.1


References:

   http://support.novell.com/security/cve/CVE-2012-5519.html
   https://bugzilla.novell.com/789566
   https://bugzilla.novell.com/827109
   http://download.novell.com/patch/finder/?keywords=ae557655624eb7bbf51bc0b9f9564386
   http://download.novell.com/patch/finder/?keywords=c56a76c53ed2bd5acd30c1dc8beab6f6



More information about the sle-security-updates mailing list