I should have mentionend that I had in mind to
run the backend as setuid "lp" program so that
normal users get sufficient permissions implicitely
e.g. to do a device state query.

I thought that "run as lp" is sufficiently secure because
"it is just what cupsd does by default" but unfortunately
I missed that with a setuid "lp" binary there is a program
available which can be executed by any user so that
now any user might be able to do anything as user "lp"
which is not sufficiently secure to have it by default :-(

By the way:
Just add all users to the "lp" group is also not sufficiently
secure to be done by default, see
https://bugzilla.novell.com/show_bug.cgi?id=349084#c9

-- 
needs a proper daemon or cupsys integration
https://bugs.launchpad.net/bugs/149045
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to