NetworkManager-libreswan-1.2.10-7.el8_10
エラータID: AXSA:2024-8943:06
This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop
Security Fix(es):
* NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-9050
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
Update packages.
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
N/A
SRPMS
- NetworkManager-libreswan-1.2.10-7.el8_10.src.rpm
MD5: a40d306ddea8f28ba43aa19b917b3c1a
SHA-256: 1eeb2e709e70fafd4b5309e330e4b51886b26563704d39bccce88dbd0165c9ee
Size: 520.06 kB
Asianux Server 8 for x86_64
- NetworkManager-libreswan-1.2.10-7.el8_10.x86_64.rpm
MD5: 4df43c9faa05c24cad7bfcf91a225201
SHA-256: 561e115eb9798c5f878c521be700357ca74baddac40c4f8d829646a1fd44ad5f
Size: 120.17 kB - NetworkManager-libreswan-gnome-1.2.10-7.el8_10.x86_64.rpm
MD5: 4fe9d259ee07ebb441f331cf664d27d8
SHA-256: e0e00a6569dfb23b1e7a45809c8253a5f9dfb20f2a18f1e4ab3f4cf4c4a47584
Size: 40.77 kB