flatpak-1.12.9-1.el8_10
エラータID: AXSA:2024-8476:06
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
Update packages.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
N/A
SRPMS
- flatpak-1.12.9-1.el8_10.src.rpm
MD5: 4ae8f483e23d13afabd22e07a4e56c5b
SHA-256: f6519cb5a21eba97d3dcbfb79defeee481c03e1dc3cd62e5776349fd7f0b4b38
Size: 1.52 MB
Asianux Server 8 for x86_64
- flatpak-1.12.9-1.el8_10.i686.rpm
MD5: bdbb5e9a9e57587de4fc2c70af90796d
SHA-256: 55048e95661a2680c2972e907425166f623fd435fe11f2be30402125675fda50
Size: 1.81 MB - flatpak-1.12.9-1.el8_10.x86_64.rpm
MD5: b4e7157dbf4bdc2452a700e8fcdfeb11
SHA-256: 5ec504fdcfb4511e1d5850f19ac46b87af9f2d9f149a55d1195fed105dfbb4b6
Size: 1.77 MB - flatpak-devel-1.12.9-1.el8_10.i686.rpm
MD5: 51d63bd6f3b930d93e95f450801e2d0c
SHA-256: aaf6d78ee08b90cfcde982ae47016984203951a4325e31eee18a211fc9b44164
Size: 117.20 kB - flatpak-devel-1.12.9-1.el8_10.x86_64.rpm
MD5: f47866630b4000ea6341a4005375d96f
SHA-256: 1e5e83fd1511b89350f0efc7bfd341ef062089d6fc42317fdca6ba629d33a411
Size: 117.18 kB - flatpak-libs-1.12.9-1.el8_10.i686.rpm
MD5: 4a9f5952ed6f441f956c96a753d7c2f0
SHA-256: c1952e3a3f7be2f49990ba1529e682007e1f19e7904055f6c418f91a358d32c9
Size: 531.20 kB - flatpak-libs-1.12.9-1.el8_10.x86_64.rpm
MD5: 62cb57ffa82a820a84f1f58171a27331
SHA-256: f16960ab198f2968048f47e8d305b16cd03ebbe0bb4d5529be870e2f8106de5a
Size: 511.83 kB - flatpak-selinux-1.12.9-1.el8_10.noarch.rpm
MD5: bf5539364848ec991352f90e8e0dca76
SHA-256: acf19987317861f9cdae70f38e526543d4c8bf28f05f835d751646d41304a15a
Size: 26.98 kB - flatpak-session-helper-1.12.9-1.el8_10.i686.rpm
MD5: 62b71c61b971fecb1ba596b6c901b606
SHA-256: 6e4fc07fcc3d0b42e2f80cdc587aac018f717597770ea0b05def9ca6a8de0e8f
Size: 78.70 kB - flatpak-session-helper-1.12.9-1.el8_10.x86_64.rpm
MD5: 958a06bd76f2f743f7bb170200e80bff
SHA-256: d21bf9b847f05af33faf6e2c9f89a34cc77427b7538cf3c2c5832b52b009fdc7
Size: 77.15 kB