[Bug 149121] Re: hpssd vulnerable to command injection

2011-01-24 Thread Kees Cook
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5028 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/149121 Title: hpssd vulnerable to command injection -- ubuntu-bugs mailin

[Bug 149121] Re: hpssd vulnerable to command injection

2007-10-14 Thread rotaflex
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5028 -- hpssd vulnerable to command injection https://bugs.launchpad.net/bugs/149121 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list

[Bug 149121] Re: hpssd vulnerable to command injection

2007-10-12 Thread Kees Cook
http://www.ubuntu.com/usn/usn-530-1 ** Visibility changed to: Public ** Changed in: hplip (Ubuntu Edgy) Status: In Progress => Fix Released ** Changed in: hplip (Ubuntu Feisty) Status: In Progress => Fix Released ** Changed in: hplip (Ubuntu Gutsy) Status: In Progress => Fi

[Bug 149121] Re: hpssd vulnerable to command injection

2007-10-04 Thread Kees Cook
Fix for hpssd.py and scan.py (which also uses open3 instead of subprocess, though I did not check to see if scan's from_address is injectable) ** Attachment added: "fix to use subprocess" http://launchpadlibrarian.net/9737865/90_subprocess_replacement.dpatch ** Visibility changed to: Public