hplip's hpssd allows local (or remote, if configured) users to execute arbitrary commands as root.
Our current stable and the last release are vulnerable, I couldn't find a public repository. A patch is available at the URL.
Denis and printing, please advise.
(In reply to comment #1)
> Denis and printing, please advise.
I'm having a real life emergency since a few days, but I'll send this at the top of my Gentoo TODO list. I should be able to look into this later today (not before 2000 UTC though).
I've had a quick look at the patch though, and it applies in a cleanish way on the 2.x series, but not on the 1.x series. So I'll have to manually create a patch for the 1.x stuff. This should be easy. About the security issue itself, it's far beyond my understanding so I'll have to trust the Red Hat people unless somebody else knows better.
Any news on this one?
I've just fixed the new 2.x branch. I'm now proceeding to look into the old stuff.
Upstream says the fix will be in 2.7.10.
Old 1.x branch is now cleaned-up and fixed too. Security, feel free to stabilize hplip-1.7.4a-r2 and close this bug whenever you want.
Arches please test and mark stable. Target keywords are:
hplip-1.7.4a-r2.ebuild:KEYWORDS="amd64 ppc ~ppc64 x86"
GLSA request filed.
Old ebuild removed after stabilization. All that's left in the tree is now clean.
GLSA 200710-26, thanks everybody!