bubblewrap and flatpak security update
エラータID: AXSA:2024-8787:02
リリース日:
2024/09/06 Friday - 15:44
題名:
bubblewrap and flatpak security update
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Flatpak には、persistent=subdir オプションが指定されて
いる場合、パーシステントディレクトリをマウントする際、
本来アクセスが許容されていないファイルへのアクセスを
許容してしまう問題があるため、リモートの攻撃者により、
細工されたシンボリックリンクを介して、データ破壊、
および情報の漏洩を可能とする脆弱性が存在します。
(CVE-2024-42472)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox. Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code. For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox. Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code. For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
追加情報:
N/A
ダウンロード:
SRPMS
- bubblewrap-0.4.1-7.el9_4.ML.1.src.rpm
MD5: 2130ab63e9cca402674fcc88a762f6d8
SHA-256: 95fc67f40ce990ce7ed183f76fdc583e5b62c19023d66d3c2a710a92170f554a
Size: 222.33 kB - flatpak-1.12.9-3.el9_4.src.rpm
MD5: e5d38655ab196a5988850fd2bcbd87a2
SHA-256: ad558ce99bfdf90d7d5be512b512284e019afd2909c9d7c4e5396eb642ce7572
Size: 1.52 MB
Asianux Server 9 for x86_64
- bubblewrap-0.4.1-7.el9_4.ML.1.x86_64.rpm
MD5: 389ce56b08adf48e7b266164600f9383
SHA-256: d1d051c2ab67d7dc5977ab0960d0946a9f7f07d2faa009fedace854d74be98aa
Size: 48.59 kB - flatpak-1.12.9-3.el9_4.i686.rpm
MD5: aced3a055ecc7e9ed5e51b9bad0f34bf
SHA-256: 6b909017fa35111e3d06c61501cb746916c0ed962332f449f12efba410589f58
Size: 1.76 MB - flatpak-1.12.9-3.el9_4.x86_64.rpm
MD5: 7ce08357e9e4544db94087c65f13ce8d
SHA-256: 6ca8ccc46ed88990fe5b9d46f0daef6955904e1d7599c6ed56df8f0d896b4bbb
Size: 1.72 MB - flatpak-devel-1.12.9-3.el9_4.i686.rpm
MD5: ce6b998f7d2733fa2972c32b30ac456f
SHA-256: 0a86b6a26c0792a127c26b5f9bc7c6bd3b72cdee9e97319ad9719e531c64d95a
Size: 117.67 kB - flatpak-devel-1.12.9-3.el9_4.x86_64.rpm
MD5: 5b484fc279526e12a851d017ecacd739
SHA-256: b779075203164837f03a75e9e1239f4c0d4629f05385d3b53007a7dc1d576351
Size: 117.65 kB - flatpak-libs-1.12.9-3.el9_4.i686.rpm
MD5: b97112a5f5c0f4cbb69bae74b2d2c8e9
SHA-256: 58717a8ad06c376a43a831d57b2729ccd9cc6c5e535301ede754e828d7c873f8
Size: 519.29 kB - flatpak-libs-1.12.9-3.el9_4.x86_64.rpm
MD5: e87ec242ab7b1b91105fe5cc68f88817
SHA-256: e731b290736dd45d49d1748c9a6b940c30d28c90d4d087eabe17338a5809bbb4
Size: 495.64 kB - flatpak-selinux-1.12.9-3.el9_4.noarch.rpm
MD5: 238833d9674332bf2493c894acff2811
SHA-256: ce1d798263e9be50a443c672740c41575b3bd2f4e38e6f5f9eb7b9d518761ed1
Size: 20.77 kB - flatpak-session-helper-1.12.9-3.el9_4.i686.rpm
MD5: f5930a104576db1a45e0694ad17e18ad
SHA-256: bb8ca413a110598b69c27b7d282a1409e64ff0cb55fb04f63a4459a7cc093525
Size: 73.83 kB - flatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm
MD5: 9dd8379e5dd7112c8e4f8d95dae29b85
SHA-256: d7d0a65ebe4141d8cac35a635f3375890ff42a8623b62efbae649cd99a6b82b9
Size: 72.11 kB