First published: Tue Jun 30 2020(Updated: )
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hylafax\+ Project Hylafax\+ | <=7.0.2 | |
Ifax Hylafax Enterprise | ||
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.