Updated hylafax+ packages fix security vulnerabilities
Publication date: 31 Aug 2020Modification date: 31 Aug 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-15396 , CVE-2020-15397
Description
In HylaFAX+ through 7.0.2, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root (CVE-2020-15396). HylaFAX+ through 7.0.2 has scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root) (CVE-2020-15397). The hylafax+ package has been updated to version 7.0.3, fixing thesee issues and several other bugs.
References
- https://bugs.mageia.org/show_bug.cgi?id=27170
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
- https://hylafax.sourceforge.io/news/7.0.3.php
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15397
SRPMS
7/core
- hylafax+-7.0.3-1.mga7