bubblewrap-0.4.1-8.el9, flatpak-1.12.9-3.el9
エラータID: AXSA:2024-9109:02
リリース日:
2024/12/11 Wednesday - 18:44
題名:
bubblewrap-0.4.1-8.el9, flatpak-1.12.9-3.el9
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Flatpak には、persistent=subdir オプションが指定されている
場合、パーシステントディレクトリをマウントする際、本来
アクセスが許容されていないファイルへのアクセスを許容して
しまう問題があるため、リモートの攻撃者により、細工された
シンボリックリンクを介して、データ破壊、および情報の漏洩
を可能とする脆弱性が存在します。(CVE-2024-42472)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox. Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code. For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox. Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code. For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
追加情報:
N/A
ダウンロード:
SRPMS
- bubblewrap-0.4.1-8.el9.src.rpm
MD5: 11eb45fd9eda4c1ca08589403674f4ec
SHA-256: 50a0cdecb4cf6195f4aa23a0ef4cdde6821159d1ab4500a331eaba20ed62b664
Size: 222.87 kB - flatpak-1.12.9-3.el9.src.rpm
MD5: 6169f54925c666bfe001fe3b4029be95
SHA-256: 8c26dbe82e69a1a16cda299f26dca2b65bdde48ac5848320e34a2d3a732a590f
Size: 1.52 MB
Asianux Server 9 for x86_64
- bubblewrap-0.4.1-8.el9.x86_64.rpm
MD5: 289ec819922e1856db1cb02054d29431
SHA-256: 8675ec7bf2fde0ddcdd14ce43cddd1af9ef142423a59634632e97ba84d276373
Size: 48.45 kB - flatpak-1.12.9-3.el9.i686.rpm
MD5: b7808e653d7c0bdf31721c929e9c1d79
SHA-256: 480940a490aa48745ee46422178b0793e790402348742ffbd1cc1009aaaa53a3
Size: 1.76 MB - flatpak-1.12.9-3.el9.x86_64.rpm
MD5: f0580c3fc45c03db026894fbbbe96744
SHA-256: d5fce740f2ea74c49941a4856a39063f8cee39de118d58b9073b907b45b64230
Size: 1.72 MB - flatpak-devel-1.12.9-3.el9.i686.rpm
MD5: 17ebb0aec2c99a5423f128d1e75f0ec4
SHA-256: c0621e36580284d8aba27383a32732a073f8ce8aa4ebf3330a1222d17b97821e
Size: 117.57 kB - flatpak-devel-1.12.9-3.el9.x86_64.rpm
MD5: 8ddbeaef498094926bd7cf748ae2bea1
SHA-256: 54a6106078a6b823ff53fe420fdf391465e88590f4d1abe61e5a3b2884f0168d
Size: 117.52 kB - flatpak-libs-1.12.9-3.el9.i686.rpm
MD5: cd81853af50dafafbf05d4c842bdf0cf
SHA-256: efa7c1b7ee5608317922d5f2d8c5b5210e309991f147f75bd675df5ec69cf3eb
Size: 518.54 kB - flatpak-libs-1.12.9-3.el9.x86_64.rpm
MD5: 74b3dce84381fb9dd74bb0dbeb5eee64
SHA-256: dee4a3c471a1128c727eb8f98c65509ee94203c27d1b7ce342ac30af8c79d403
Size: 495.38 kB - flatpak-selinux-1.12.9-3.el9.noarch.rpm
MD5: cd877719d6e5d6177b13d4036f908138
SHA-256: 04639aa4f6e4a3813bf77f9d5afc85ee3ea2821ce62dee730f85bc69bae15e57
Size: 20.64 kB - flatpak-session-helper-1.12.9-3.el9.i686.rpm
MD5: b263952ba6e4dd11a35656b84331a1a8
SHA-256: 50d16582055e31f948c7e6813fca268a6909098efbcaf86a16355cab9c23628d
Size: 73.62 kB - flatpak-session-helper-1.12.9-3.el9.x86_64.rpm
MD5: 434c9bb39d1b379521a05c519613f4f9
SHA-256: 1ecc82d962eef126ba0b2661a2293dae0a4c943e13c18f5fc99e1bda7d8edf45
Size: 71.96 kB