flatpak-1.12.9-1.el8_10
エラータID: AXSA:2024-8476:06
リリース日:
2024/06/27 Thursday - 15:23
題名:
flatpak-1.12.9-1.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Flatpak には、
org.freedesktop.portal.Background.RequestBackground
に引き渡すコマンドライン引数を --command= オプション
の引き渡すことでサンドボックスの迂回を許容してしまう
問題があるため、ローカルの攻撃者により、細工された
Flatpak アプリケーションを介して、サンドボックス外
での任意のコードの実行を可能とする脆弱性が存在します。
(CVE-2024-32462)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
追加情報:
N/A
ダウンロード:
SRPMS
- flatpak-1.12.9-1.el8_10.src.rpm
MD5: 4ae8f483e23d13afabd22e07a4e56c5b
SHA-256: f6519cb5a21eba97d3dcbfb79defeee481c03e1dc3cd62e5776349fd7f0b4b38
Size: 1.52 MB
Asianux Server 8 for x86_64
- flatpak-1.12.9-1.el8_10.i686.rpm
MD5: bdbb5e9a9e57587de4fc2c70af90796d
SHA-256: 55048e95661a2680c2972e907425166f623fd435fe11f2be30402125675fda50
Size: 1.81 MB - flatpak-1.12.9-1.el8_10.x86_64.rpm
MD5: b4e7157dbf4bdc2452a700e8fcdfeb11
SHA-256: 5ec504fdcfb4511e1d5850f19ac46b87af9f2d9f149a55d1195fed105dfbb4b6
Size: 1.77 MB - flatpak-devel-1.12.9-1.el8_10.i686.rpm
MD5: 51d63bd6f3b930d93e95f450801e2d0c
SHA-256: aaf6d78ee08b90cfcde982ae47016984203951a4325e31eee18a211fc9b44164
Size: 117.20 kB - flatpak-devel-1.12.9-1.el8_10.x86_64.rpm
MD5: f47866630b4000ea6341a4005375d96f
SHA-256: 1e5e83fd1511b89350f0efc7bfd341ef062089d6fc42317fdca6ba629d33a411
Size: 117.18 kB - flatpak-libs-1.12.9-1.el8_10.i686.rpm
MD5: 4a9f5952ed6f441f956c96a753d7c2f0
SHA-256: c1952e3a3f7be2f49990ba1529e682007e1f19e7904055f6c418f91a358d32c9
Size: 531.20 kB - flatpak-libs-1.12.9-1.el8_10.x86_64.rpm
MD5: 62cb57ffa82a820a84f1f58171a27331
SHA-256: f16960ab198f2968048f47e8d305b16cd03ebbe0bb4d5529be870e2f8106de5a
Size: 511.83 kB - flatpak-selinux-1.12.9-1.el8_10.noarch.rpm
MD5: bf5539364848ec991352f90e8e0dca76
SHA-256: acf19987317861f9cdae70f38e526543d4c8bf28f05f835d751646d41304a15a
Size: 26.98 kB - flatpak-session-helper-1.12.9-1.el8_10.i686.rpm
MD5: 62b71c61b971fecb1ba596b6c901b606
SHA-256: 6e4fc07fcc3d0b42e2f80cdc587aac018f717597770ea0b05def9ca6a8de0e8f
Size: 78.70 kB - flatpak-session-helper-1.12.9-1.el8_10.x86_64.rpm
MD5: 958a06bd76f2f743f7bb170200e80bff
SHA-256: d21bf9b847f05af33faf6e2c9f89a34cc77427b7538cf3c2c5832b52b009fdc7
Size: 77.15 kB