• [gentoo-announce] [ GLSA 202411-02 ] Flatpak: Sandbox Escape

    From glsamaker@gentoo.org@21:1/5 to All on Wed Nov 6 13:20:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202411-02
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Flatpak: Sandbox Escape
    Date: November 06, 2024
    Bugs: #937936
    ID: 202411-02

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Flatpak, which can lead to a
    sandbox escape.

    Background
    ==========

    Flatpak is a Linux application sandboxing and distribution framework.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------------- ------------ ------------
    sys-apps/flatpak < 1.4.10 >= 1.4.10

    Description
    ===========

    A vulnerability has been discovered in Flatpak. Please review the CVE identifier referenced below for details.

    Impact
    ======

    A malicious or compromised Flatpak app using persistent directories
    could
    read and write files in locations it would not normally have access to.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Flatpak users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-apps/flatpak-1.4.10"

    References
    ==========

    [ 1 ] CVE-2024-42472
    https://nvd.nist.gov/vuln/detail/CVE-2024-42472

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202411-02

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmcrXWYACgkQFMQkOaVy +9lwRhAAtc/lgPvn8c3VJ02zhGKHj3O9cvThTPgVWEb9iB6oZKwZYyl4d1ctiBBk fA2rJkLAlgHNyfN9zhlzlxW99oPEjLP2ZY/8TN1mRktfAw5Mvz6gnMAeedrdcfps OylE19HIdT4XN4WpO5d9NVw1IkHsJXJYO0VrtreL+h8pEfU5NAgebX7AJ+zk5dBo wnys5y4IhcREuLfo/zcl1EqaTkccgUD3e9eMnVbGQeIMaY7VzaTmXoCZNzJK/LxG KC1+PhBHohhNic9GE8KpvqYbUI6L3BGUXa94fD95FBbTmg/iHwgzMFdi90/+GU2+ AeKY1xXLjloBlGSf8flYuBozcPfvRGk7oqqHNMKwYoODHDm6Y1NiBkoQ4DIaDxzb ejRHj9Anz2meatKXvkJvDcA3OpCnosDpWTYVctR02h+X11UhAboS/Le/Yz8exBcA 1R2INJVAdaB9t81X0lXnJJQsn2zEZlZtETu8QP/n1R9AmOqaOWDTBGwduGTCi9AO U2QDlzuaqcYEJNvU7zP8M7l7Ei4iK4fBLlF0kZQEJvTo24g5G15zy4C9Lj5HD1PE hMaeB3WIq6fIDKb7TcR7kRffr72OlYVYZAgnvi3owuioBv8nh0s81dhEp6K+Pb+P nz0kFepQBv7PPqi6Q3XptsPWffVOtU02YBpC/RfDGv7qxpyttus=
    =5Yue
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)