USN-2085-1: HPLIP vulnerabilities

Publication date

21 January 2014

Overview

Several security issues were fixed in HPLIP.


Packages

  • hplip - HP Linux Printing and Imaging System (HPLIP)

Details

It was discovered that the HPLIP Polkit daemon incorrectly handled
temporary files. A local attacker could possibly use this issue to
overwrite arbitrary files. In the default installation of Ubuntu 12.04 LTS
and higher, this should be prevented by the Yama link restrictions.
(CVE-2013-6402)

It was discovered that HPLIP contained an upgrade tool that would download
code in an unsafe fashion. If a remote attacker were able to perform a
machine-in-the-middle attack, this flaw could be exploited to execute arbitrary
code. (CVE-2013-6427)

It was discovered that the HPLIP Polkit daemon incorrectly handled
temporary files. A local attacker could possibly use this issue to
overwrite arbitrary files. In the default installation of Ubuntu 12.04 LTS
and higher, this should be prevented by the Yama link restrictions.
(CVE-2013-6402)

It was discovered that HPLIP contained an upgrade tool that would download
code in an unsafe fashion. If a remote attacker were able to perform a
machine-in-the-middle attack, this flaw could be exploited to execute arbitrary
code. (CVE-2013-6427)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
13.10 saucy hplip –  3.13.9-1ubuntu0.1
12.10 quantal hplip –  3.12.6-3ubuntu4.3
12.04 precise hplip –  3.12.2-1ubuntu3.4
10.04 lucid hplip –  3.10.2-2ubuntu2.5

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›