MGASA-2020-0356

Source
https://advisories.mageia.org/MGASA-2020-0356.html
Import Source
https://advisories.mageia.org/MGASA-2020-0356.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0356
Related
Published
2020-08-31T23:58:35Z
Modified
2020-08-31T23:21:31Z
Summary
Updated hylafax+ packages fix security vulnerabilities
Details

In HylaFAX+ through 7.0.2, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root (CVE-2020-15396).

HylaFAX+ through 7.0.2 has scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root) (CVE-2020-15397).

The hylafax+ package has been updated to version 7.0.3, fixing thesee issues and several other bugs.

References
Credits

Affected packages

Mageia:7 / hylafax+

Package

Name
hylafax+
Purl
pkg:rpm/mageia/hylafax+?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
+-7.0.3-1.mga7

Ecosystem specific

{
    "section": "core"
}