** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5028
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/149121
Title:
hpssd vulnerable to command injection
--
ubuntu-bugs mailin
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5028
--
hpssd vulnerable to command injection
https://bugs.launchpad.net/bugs/149121
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
http://www.ubuntu.com/usn/usn-530-1
** Visibility changed to: Public
** Changed in: hplip (Ubuntu Edgy)
Status: In Progress => Fix Released
** Changed in: hplip (Ubuntu Feisty)
Status: In Progress => Fix Released
** Changed in: hplip (Ubuntu Gutsy)
Status: In Progress => Fi
Fix for hpssd.py and scan.py (which also uses open3 instead of
subprocess, though I did not check to see if scan's from_address is
injectable)
** Attachment added: "fix to use subprocess"
http://launchpadlibrarian.net/9737865/90_subprocess_replacement.dpatch
** Visibility changed to: Public