<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for hylafax+</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1210-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-08-14T18:19:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-08-14T18:19:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-08-14T18:19:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for hylafax+</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for hylafax+ fixes the following issues:

Hylafax was updated to upstream version 7.0.3.

Security issues fixed:

- CVE-2020-15396: Secure temporary directory creation for faxsetup, faxaddmodem, and probemodem (boo#1173521).
- CVE-2020-15397: Sourcing of files into binaries from user writeable directories (boo#1173519).

Non-security issues fixed:

* add UseSSLFax feature in sendfax, sendfax.conf, hyla.conf, and JobControl
  (31 Jul 2020)
* be more resilient in listening for the Phase C carrier (30 Jul 2020)
* make sure to return to command mode if HDLC receive times out (29 Jul 2020)
* make faxmail ignore boundaries on parts other than multiparts (29 Jul 2020)
* don't attempt to write zero bytes of data to a TIFF (29 Jul 2020)
* don't ever respond to CRP with CRP (28 Jul 2020)
* reset frame counter when a sender retransmits PPS for a previously confirmed
  ECM block (26 Jul 2020)
* scrutinize PPM before concluding that the sender missed our MCF (23 Jul 2020)
* fix modem recovery after SSL Fax failure (22, 26 Jul 2020)
* ignore echo of PPR, RTN, CRP (10, 13, 21 Jul 2020)
* attempt to handle NSF/CSI/DIS in Class 1 sending Phase D (6 Jul 2020)
* run scripts directly rather than invoking them via a shell for security
  hardening (3-5 Jul 2020)
* add senderFumblesECM feature (3 Jul 2020)
* add support for PIN/PIP/PRI-Q/PPS-PRI-Q signals, add senderConfusesPIN
  feature, and utilize PIN for rare conditions where it may be helpful
  (2, 6, 13-14 Jul 2020)
* add senderConfusesRTN feature (25-26 Jun 2020)
* add MissedPageHandling feature (24 Jun 2020)
* use and handle CFR in Phase D to retransmit Phase C (16, 23 Jun 2020)
* cope with hearing echo of RR, CTC during Class 1 sending (15-17 Jun 2020)
* fix listening for retransmission of MPS/EOP/EOM if it was received
  corrupt on the first attempt (15 Jun 2020)
* don't use CRP when receiving PPS/PPM as some senders think
  we are sending MCF (12 Jun 2020)
* add BR_SSLFAX to show SSL Fax in notify and faxinfo output (1 Jun 2020)
* have faxinfo put units on non-standard page dimensions (28 May 2020)
* improve error messages for JobHost connection errors (22 May 2020)
* fix perpetual blocking of jobs when a job preparation fails,
  attempt to fix similar blocking problems for bad jobs in
  batches, and add 'unblock' faxconfig feature (21 May 2020)
* ignore TCF if we're receiving an SSL Fax (31 Jan 2020)
* fixes for build on FreeBSD 12.1 (31 Jan - 3 Feb 2020)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1210</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2R3IEUFA5QVGZ3Z4DHFPJS73HGA5WVD/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1210-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173519</URL>
      <Description>SUSE Bug 1173519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173521</URL>
      <Description>SUSE Bug 1173521</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15396/</URL>
      <Description>SUSE CVE CVE-2020-15396 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15397/</URL>
      <Description>SUSE CVE CVE-2020-15397 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="hylafax+-7.0.3-lp151.4.6.1">
      <FullProductName ProductID="hylafax+-7.0.3-lp151.4.6.1">hylafax+-7.0.3-lp151.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="hylafax+-client-7.0.3-lp151.4.6.1">
      <FullProductName ProductID="hylafax+-client-7.0.3-lp151.4.6.1">hylafax+-client-7.0.3-lp151.4.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfaxutil7_0_3-7.0.3-lp151.4.6.1">
      <FullProductName ProductID="libfaxutil7_0_3-7.0.3-lp151.4.6.1">libfaxutil7_0_3-7.0.3-lp151.4.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="hylafax+-7.0.3-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:hylafax+-7.0.3-lp151.4.6.1">hylafax+-7.0.3-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="hylafax+-client-7.0.3-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:hylafax+-client-7.0.3-lp151.4.6.1">hylafax+-client-7.0.3-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfaxutil7_0_3-7.0.3-lp151.4.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libfaxutil7_0_3-7.0.3-lp151.4.6.1">libfaxutil7_0_3-7.0.3-lp151.4.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.</Note>
    </Notes>
    <CVE>CVE-2020-15396</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:hylafax+-7.0.3-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:hylafax+-client-7.0.3-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libfaxutil7_0_3-7.0.3-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2R3IEUFA5QVGZ3Z4DHFPJS73HGA5WVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15396.html</URL>
        <Description>CVE-2020-15396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173521</URL>
        <Description>SUSE Bug 1173521</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).</Note>
    </Notes>
    <CVE>CVE-2020-15397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:hylafax+-7.0.3-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:hylafax+-client-7.0.3-lp151.4.6.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libfaxutil7_0_3-7.0.3-lp151.4.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2R3IEUFA5QVGZ3Z4DHFPJS73HGA5WVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15397.html</URL>
        <Description>CVE-2020-15397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173519</URL>
        <Description>SUSE Bug 1173519</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
