This bug was fixed in the package cups-pk-helper - 0.2.1.2-1ubuntu1.1 --------------- cups-pk-helper (0.2.1.2-1ubuntu1.1) quantal-security; urgency=low
* SECURITY UPDATE: CUPS function calls were wrapped insecurely, which could be used to upload sensitive data to a CUPS resource, or overwrite specific files with the content of a CUPS resource. The user would have to explicitly approve the action. (LP: #1083416) - CVE-2012-4510 - debian/patches/CVE-2012-4510-part1.patch: Copied from git - debian/patches/CVE-2012-4510-part2.patch: Copied from git -- Jeremy Bicha <jbi...@ubuntu.com> Mon, 26 Nov 2012 22:12:08 -0500 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1083416 Title: cups-pk-helper security vulnerability CVE-2012-4510 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cups-pk-helper/+bug/1083416/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs