MGASA-2020-0356 - Updated hylafax+ packages fix security vulnerabilities

Publication date: 31 Aug 2020
URL: https://advisories.mageia.org/MGASA-2020-0356.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-15396,
     CVE-2020-15397

In HylaFAX+ through 7.0.2, the faxsetup utility calls chown on files in
user-owned directories. By winning a race, a local attacker could use this to
escalate his privileges to root (CVE-2020-15396).

HylaFAX+ through 7.0.2 has scripts that execute binaries from directories
writable by unprivileged users (e.g., locations under /var/spool/hylafax that
are writable by the uucp account). This allows these users to execute code in
the context of the user calling these binaries (often root) (CVE-2020-15397).

The hylafax+ package has been updated to version 7.0.3, fixing thesee issues
and several other bugs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=27170
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/
- https://hylafax.sourceforge.io/news/7.0.3.php
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15397

SRPMS:
- 7/core/hylafax+-7.0.3-1.mga7