- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202411-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Flatpak: Sandbox Escape
Date: November 06, 2024
Bugs: #937936
ID: 202411-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability has been discovered in Flatpak, which can lead to a
sandbox escape.
Background
==========
Flatpak is a Linux application sandboxing and distribution framework.
Affected packages
=================
Package Vulnerable Unaffected
---------------- ------------ ------------
sys-apps/flatpak < 1.4.10 >= 1.4.10
Description
===========
A vulnerability has been discovered in Flatpak. Please review the CVE identifier referenced below for details.
Impact
======
A malicious or compromised Flatpak app using persistent directories
could
read and write files in locations it would not normally have access to.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Flatpak users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/flatpak-1.4.10"
References
==========
[ 1 ] CVE-2024-42472
https://nvd.nist.gov/vuln/detail/CVE-2024-42472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202411-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmcrXWYACgkQFMQkOaVy +9lwRhAAtc/lgPvn8c3VJ02zhGKHj3O9cvThTPgVWEb9iB6oZKwZYyl4d1ctiBBk fA2rJkLAlgHNyfN9zhlzlxW99oPEjLP2ZY/8TN1mRktfAw5Mvz6gnMAeedrdcfps OylE19HIdT4XN4WpO5d9NVw1IkHsJXJYO0VrtreL+h8pEfU5NAgebX7AJ+zk5dBo wnys5y4IhcREuLfo/zcl1EqaTkccgUD3e9eMnVbGQeIMaY7VzaTmXoCZNzJK/LxG KC1+PhBHohhNic9GE8KpvqYbUI6L3BGUXa94fD95FBbTmg/iHwgzMFdi90/+GU2+ AeKY1xXLjloBlGSf8flYuBozcPfvRGk7oqqHNMKwYoODHDm6Y1NiBkoQ4DIaDxzb ejRHj9Anz2meatKXvkJvDcA3OpCnosDpWTYVctR02h+X11UhAboS/Le/Yz8exBcA 1R2INJVAdaB9t81X0lXnJJQsn2zEZlZtETu8QP/n1R9AmOqaOWDTBGwduGTCi9AO U2QDlzuaqcYEJNvU7zP8M7l7Ei4iK4fBLlF0kZQEJvTo24g5G15zy4C9Lj5HD1PE hMaeB3WIq6fIDKb7TcR7kRffr72OlYVYZAgnvi3owuioBv8nh0s81dhEp6K+Pb+P nz0kFepQBv7PPqi6Q3XptsPWffVOtU02YBpC/RfDGv7qxpyttus=
=5Yue
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)