-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2562-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst October 23, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : cups-pk-helper Vulnerability : privilege escalation Problem type : local Debian-specific: no CVE ID : CVE-2012-4510 cups-pk-helper, a PolicyKit helper to configure cups with fine-grained privileges, wraps CUPS function calls in an insecure way. This could lead to uploading sensitive data to a cups resource, or overwriting specific files with the content of a cups resource. The user would have to explicitly approve the action. For the stable distribution (squeeze), this problem has been fixed in version 0.1.0-3. For the testing distribution (wheezy), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 0.2.3-1. We recommend that you upgrade your cups-pk-helper packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQhskJAAoJEFb2GnlAHawEXhkH/iyGhk8w5HULxXbln19fCBiD ZDdOuNtyue6PeeLb6Qyq6QPU+9M3i4Pb9MBpQM7JK5iheqvYDGpkRKjLsvQ22GOw 33Xs8Kj5QtIfqGAMT4ntnIiszI8369Q1aWdDYZ6s044xrC5p+C5UDw2Mvb4ArZ3M N6td1KpyhC2/IG+lkkT5lnxvUy9rEh8iPzauP6daReF0tyne4JNFrtuwuJLa6tFo 92nUWf3slus0xUKjPY10Eanh893qwpJwS02aKLMIMxRM2MUGl6G4B8MKuzM7VaBH qcp19csluUm1LvcQgnuN3woH62nuS0H/Eps8odbNG+SPKfUbhIaujSExVeJx8Os= =8Uyv -----END PGP SIGNATURE-----