Mageia 2020-0356: hylafax+ security update
Summary
In HylaFAX+ through 7.0.2, the faxsetup utility calls chown on files in
user-owned directories. By winning a race, a local attacker could use this to
escalate his privileges to root (CVE-2020-15396).
HylaFAX+ through 7.0.2 has scripts that execute binaries from directories
writable by unprivileged users (e.g., locations under /var/spool/hylafax that
are writable by the uucp account). This allows these users to execute code in
the context of the user calling these binaries (often root) (CVE-2020-15397).
The hylafax+ package has been updated to version 7.0.3, fixing thesee issues
and several other bugs.
References
- https://bugs.mageia.org/show_bug.cgi?id=27170
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
- https://hylafax.sourceforge.io/news/7.0.3.php
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15397
Resolution
MGASA-2020-0356 - Updated hylafax+ packages fix security vulnerabilities
SRPMS
- 7/core/hylafax+-7.0.3-1.mga7