Security update for hplip

SUSE Security Update: Security update for hplip
Announcement ID: SUSE-SU-2014:0188-1
Rating: moderate
References: #808355 #835827 #836937 #852368
Affected Products:
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that solves three vulnerabilities and has one errata is now available.

    Description:


    hplip was updated to fix three security issues:

    *

    CVE-2013-0200: Some local file overwrite problems via
    predictable /tmp filenames were fixed.

    *

    CVE-2013-4325: hplip used an insecure polkit DBUS API
    (polkit-process subject race condition) which could lead to
    local privilege escalation.

    *

    CVE-2013-6402: hplip uses arbitrary file
    creation/overwrite (via hardcoded file name
    /tmp/hp-pkservice.log)

    Security Issue references:

    * CVE-2013-4325
    >
    * CVE-2013-0200
    >
    * CVE-2013-6402
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-hplip-8777
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-hplip-8777
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-hplip-8777

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
    • hplip-3.11.10-0.6.11.1
    • hplip-hpijs-3.11.10-0.6.11.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • hplip-3.11.10-0.6.11.1
    • hplip-hpijs-3.11.10-0.6.11.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • hplip-3.11.10-0.6.11.1
    • hplip-hpijs-3.11.10-0.6.11.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-0200.html
    • http://support.novell.com/security/cve/CVE-2013-4325.html
    • http://support.novell.com/security/cve/CVE-2013-6402.html
    • https://bugzilla.novell.com/808355
    • https://bugzilla.novell.com/835827
    • https://bugzilla.novell.com/836937
    • https://bugzilla.novell.com/852368
    • http://download.novell.com/patch/finder/?keywords=f01f53a6117e8797f0c7ebc4df42b9bb