NetworkManager-libreswan-1.2.10-7.el8_10
エラータID: AXSA:2024-8943:06
リリース日:
2024/10/28 Monday - 10:57
題名:
NetworkManager-libreswan-1.2.10-7.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- NetworkManager の libreswan クライアントプラグインには、
キーバリュー形式の設定値を処理する際の特殊文字のエスケープ
処理に問題があるため、ローカルの攻撃者により、細工された
設定の処理を介して、特権昇格、および特権での任意のコード
の実行を可能とする脆弱性が存在します。(CVE-2024-9050)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-9050
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
追加情報:
N/A
ダウンロード:
SRPMS
- NetworkManager-libreswan-1.2.10-7.el8_10.src.rpm
MD5: a40d306ddea8f28ba43aa19b917b3c1a
SHA-256: 1eeb2e709e70fafd4b5309e330e4b51886b26563704d39bccce88dbd0165c9ee
Size: 520.06 kB
Asianux Server 8 for x86_64
- NetworkManager-libreswan-1.2.10-7.el8_10.x86_64.rpm
MD5: 4df43c9faa05c24cad7bfcf91a225201
SHA-256: 561e115eb9798c5f878c521be700357ca74baddac40c4f8d829646a1fd44ad5f
Size: 120.17 kB - NetworkManager-libreswan-gnome-1.2.10-7.el8_10.x86_64.rpm
MD5: 4fe9d259ee07ebb441f331cf664d27d8
SHA-256: e0e00a6569dfb23b1e7a45809c8253a5f9dfb20f2a18f1e4ab3f4cf4c4a47584
Size: 40.77 kB