You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa hylafax+

Sigurnosni nedostaci programskog paketa hylafax+

openSUSE Security Update: Security update for hylafax+
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1231-1
Rating: moderate
References: #1173519 #1173521
Cross-References: CVE-2020-15396 CVE-2020-15397
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for hylafax+ fixes the following issues:

Hylafax was updated to upstream version 7.0.3.

Security issues fixed:

– CVE-2020-15396: Secure temporary directory creation for faxsetup,
faxaddmodem, and probemodem (boo#1173521).
– CVE-2020-15397: Sourcing of files into binaries from user writeable
directories (boo#1173519).

Non-security issues fixed:

* add UseSSLFax feature in sendfax, sendfax.conf, hyla.conf, and
JobControl (31 Jul 2020)
* be more resilient in listening for the Phase C carrier (30 Jul 2020)
* make sure to return to command mode if HDLC receive times out (29 Jul
2020)
* make faxmail ignore boundaries on parts other than multiparts (29 Jul
2020)
* don’t attempt to write zero bytes of data to a TIFF (29 Jul 2020)
* don’t ever respond to CRP with CRP (28 Jul 2020)
* reset frame counter when a sender retransmits PPS for a previously
confirmed ECM block (26 Jul 2020)
* scrutinize PPM before concluding that the sender missed our MCF (23 Jul
2020)
* fix modem recovery after SSL Fax failure (22, 26 Jul 2020)
* ignore echo of PPR, RTN, CRP (10, 13, 21 Jul 2020)
* attempt to handle NSF/CSI/DIS in Class 1 sending Phase D (6 Jul 2020)
* run scripts directly rather than invoking them via a shell for security
hardening (3-5 Jul 2020)
* add senderFumblesECM feature (3 Jul 2020)
* add support for PIN/PIP/PRI-Q/PPS-PRI-Q signals, add senderConfusesPIN
feature, and utilize PIN for rare conditions where it may be helpful (2,
6, 13-14 Jul 2020)
* add senderConfusesRTN feature (25-26 Jun 2020)
* add MissedPageHandling feature (24 Jun 2020)
* use and handle CFR in Phase D to retransmit Phase C (16, 23 Jun 2020)
* cope with hearing echo of RR, CTC during Class 1 sending (15-17 Jun 2020)
* fix listening for retransmission of MPS/EOP/EOM if it was received
corrupt on the first attempt (15 Jun 2020)
* don’t use CRP when receiving PPS/PPM as some senders think we are
sending MCF (12 Jun 2020)
* add BR_SSLFAX to show SSL Fax in notify and faxinfo output (1 Jun 2020)
* have faxinfo put units on non-standard page dimensions (28 May 2020)
* improve error messages for JobHost connection errors (22 May 2020)
* fix perpetual blocking of jobs when a job preparation fails, attempt to
fix similar blocking problems for bad jobs in batches, and add “unblock”
faxconfig feature (21 May 2020)
* ignore TCF if we’re receiving an SSL Fax (31 Jan 2020)
* fixes for build on FreeBSD 12.1 (31 Jan – 3 Feb 2020)

This update was imported from the openSUSE:Leap:15.1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2020-1231=1

Package List:

– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

hylafax+-7.0.3-bp151.6.4.1
hylafax+-client-7.0.3-bp151.6.4.1
libfaxutil7_0_3-7.0.3-bp151.6.4.1

References:

https://www.suse.com/security/cve/CVE-2020-15396.html
https://www.suse.com/security/cve/CVE-2020-15397.html
https://bugzilla.suse.com/1173519
https://bugzilla.suse.com/1173521


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa bind

Otkriveni su sigurnosni nedostaci u programskom paketu bind za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja....

Close