* SECURITY UPDATE: CUPS function calls were wrapped insecurely, which
could be used to upload sensitive data to a CUPS resource, or overwrite
specific files with the content of a CUPS resource. The user would have
to explicitly approve the action. (LP: #1083416)
- CVE-2012-4510
- debian/patches/CVE-2012-4510-part1.patch: Copied from git
- debian/patches/CVE-2012-4510-part2.patch: Copied from git
-- Jeremy Bicha <email address hidden> Mon, 26 Nov 2012 22:12:08 -0500
This bug was fixed in the package cups-pk-helper - 0.2.1.2-1ubuntu1.1
--------------- 2-1ubuntu1. 1) quantal-security; urgency=low
cups-pk-helper (0.2.1.
* SECURITY UPDATE: CUPS function calls were wrapped insecurely, which patches/ CVE-2012- 4510-part1. patch: Copied from git patches/ CVE-2012- 4510-part2. patch: Copied from git
could be used to upload sensitive data to a CUPS resource, or overwrite
specific files with the content of a CUPS resource. The user would have
to explicitly approve the action. (LP: #1083416)
- CVE-2012-4510
- debian/
- debian/
-- Jeremy Bicha <email address hidden> Mon, 26 Nov 2012 22:12:08 -0500