You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa hylafax+

Sigurnosni nedostaci programskog paketa hylafax+

openSUSE Security Update: Security update for hylafax+
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1438-1
Rating: moderate
References: #1173519 #1173521
Cross-References: CVE-2020-15396 CVE-2020-15397
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for hylafax+ fixes the following issues:

Hylafax was updated to upstream version 7.0.3.

Security issues fixed:

– CVE-2020-15396: Secure temporary directory creation for faxsetup,
faxaddmodem, and probemodem (boo#1173521).
– CVE-2020-15397: Sourcing of files into binaries from user writeable
directories (boo#1173519).

Non-security issues fixed:

* add UseSSLFax feature in sendfax, sendfax.conf, hyla.conf, and
JobControl (31 Jul 2020)
* be more resilient in listening for the Phase C carrier (30 Jul 2020)
* make sure to return to command mode if HDLC receive times out (29 Jul
2020)
* make faxmail ignore boundaries on parts other than multiparts (29 Jul
2020)
* don’t attempt to write zero bytes of data to a TIFF (29 Jul 2020)
* don’t ever respond to CRP with CRP (28 Jul 2020)
* reset frame counter when a sender retransmits PPS for a previously
confirmed ECM block (26 Jul 2020)
* scrutinize PPM before concluding that the sender missed our MCF (23 Jul
2020)
* fix modem recovery after SSL Fax failure (22, 26 Jul 2020)
* ignore echo of PPR, RTN, CRP (10, 13, 21 Jul 2020)
* attempt to handle NSF/CSI/DIS in Class 1 sending Phase D (6 Jul 2020)
* run scripts directly rather than invoking them via a shell for security
hardening (3-5 Jul 2020)
* add senderFumblesECM feature (3 Jul 2020)
* add support for PIN/PIP/PRI-Q/PPS-PRI-Q signals, add senderConfusesPIN
feature, and utilize PIN for rare conditions where it may be helpful (2,
6, 13-14 Jul 2020)
* add senderConfusesRTN feature (25-26 Jun 2020)
* add MissedPageHandling feature (24 Jun 2020)
* use and handle CFR in Phase D to retransmit Phase C (16, 23 Jun 2020)
* cope with hearing echo of RR, CTC during Class 1 sending (15-17 Jun 2020)
* fix listening for retransmission of MPS/EOP/EOM if it was received
corrupt on the first attempt (15 Jun 2020)
* don’t use CRP when receiving PPS/PPM as some senders think we are
sending MCF (12 Jun 2020)
* add BR_SSLFAX to show SSL Fax in notify and faxinfo output (1 Jun 2020)
* have faxinfo put units on non-standard page dimensions (28 May 2020)
* improve error messages for JobHost connection errors (22 May 2020)
* fix perpetual blocking of jobs when a job preparation fails, attempt to
fix similar blocking problems for bad jobs in batches, and add “unblock”
faxconfig feature (21 May 2020)
* ignore TCF if we’re receiving an SSL Fax (31 Jan 2020)
* fixes for build on FreeBSD 12.1 (31 Jan – 3 Feb 2020)

This update was imported from the openSUSE:Leap:15.2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15-SP2:

zypper in -t patch openSUSE-2020-1438=1

Package List:

– openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):

hylafax+-7.0.3-bp152.3.4.1
hylafax+-client-7.0.3-bp152.3.4.1
libfaxutil7_0_3-7.0.3-bp152.3.4.1

References:

https://www.suse.com/security/cve/CVE-2020-15396.html
https://www.suse.com/security/cve/CVE-2020-15397.html
https://bugzilla.suse.com/1173519
https://bugzilla.suse.com/1173521


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke librepo

Otkriven je sigurnosni nedostatak programske biblioteke librepo za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje 'directory traversal' napada....

Close