flatpak-1.12.9-1.el8_10

エラータID: AXSA:2024-8476:06

Release date: 
Thursday, June 27, 2024 - 15:23
Subject: 
flatpak-1.12.9-1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

Security Fix(es):

* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.

CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. flatpak-1.12.9-1.el8_10.src.rpm
    MD5: 4ae8f483e23d13afabd22e07a4e56c5b
    SHA-256: f6519cb5a21eba97d3dcbfb79defeee481c03e1dc3cd62e5776349fd7f0b4b38
    Size: 1.52 MB

Asianux Server 8 for x86_64
  1. flatpak-1.12.9-1.el8_10.i686.rpm
    MD5: bdbb5e9a9e57587de4fc2c70af90796d
    SHA-256: 55048e95661a2680c2972e907425166f623fd435fe11f2be30402125675fda50
    Size: 1.81 MB
  2. flatpak-1.12.9-1.el8_10.x86_64.rpm
    MD5: b4e7157dbf4bdc2452a700e8fcdfeb11
    SHA-256: 5ec504fdcfb4511e1d5850f19ac46b87af9f2d9f149a55d1195fed105dfbb4b6
    Size: 1.77 MB
  3. flatpak-devel-1.12.9-1.el8_10.i686.rpm
    MD5: 51d63bd6f3b930d93e95f450801e2d0c
    SHA-256: aaf6d78ee08b90cfcde982ae47016984203951a4325e31eee18a211fc9b44164
    Size: 117.20 kB
  4. flatpak-devel-1.12.9-1.el8_10.x86_64.rpm
    MD5: f47866630b4000ea6341a4005375d96f
    SHA-256: 1e5e83fd1511b89350f0efc7bfd341ef062089d6fc42317fdca6ba629d33a411
    Size: 117.18 kB
  5. flatpak-libs-1.12.9-1.el8_10.i686.rpm
    MD5: 4a9f5952ed6f441f956c96a753d7c2f0
    SHA-256: c1952e3a3f7be2f49990ba1529e682007e1f19e7904055f6c418f91a358d32c9
    Size: 531.20 kB
  6. flatpak-libs-1.12.9-1.el8_10.x86_64.rpm
    MD5: 62cb57ffa82a820a84f1f58171a27331
    SHA-256: f16960ab198f2968048f47e8d305b16cd03ebbe0bb4d5529be870e2f8106de5a
    Size: 511.83 kB
  7. flatpak-selinux-1.12.9-1.el8_10.noarch.rpm
    MD5: bf5539364848ec991352f90e8e0dca76
    SHA-256: acf19987317861f9cdae70f38e526543d4c8bf28f05f835d751646d41304a15a
    Size: 26.98 kB
  8. flatpak-session-helper-1.12.9-1.el8_10.i686.rpm
    MD5: 62b71c61b971fecb1ba596b6c901b606
    SHA-256: 6e4fc07fcc3d0b42e2f80cdc587aac018f717597770ea0b05def9ca6a8de0e8f
    Size: 78.70 kB
  9. flatpak-session-helper-1.12.9-1.el8_10.x86_64.rpm
    MD5: 958a06bd76f2f743f7bb170200e80bff
    SHA-256: d21bf9b847f05af33faf6e2c9f89a34cc77427b7538cf3c2c5832b52b009fdc7
    Size: 77.15 kB