Package: hplip
Version: 0.8.7-2
Severity: grave
Justification: user security hole

.hplip.conf is created in 666 mode.

Since this conf file contains commands which may be launched using the
user's right it can be used to cause unwanted process gain access to
user's data, by putting specially crafted wrappers in the [commands] section.

Solution is to create this file in 600 mode.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-2-k7
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages hplip depends on:
ii  cupsys                      1.1.23-3     Common UNIX Printing System(tm) - 
ii  hplip-data                  0.8.7-2      HP Linux Printing and Imaging - da
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libcupsys2-gnutls10         1.1.23-3     Common UNIX Printing System(tm) - 
ii  libgcc1                     1:3.4.3-7    GCC support library
ii  libsnmp5                    5.1.2-6      NET SNMP (Simple Network Managemen
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries
ii  libstdc++5                  1:3.3.5-7    The GNU Standard C++ Library v3
ii  python                      2.3.4-6      An interactive high-level object-o
ii  python-qt3                  3.13-4       Qt3 bindings for Python (default v

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to