• [gentoo-announce] [ GLSA 202406-02 ] Flatpak: Sandbox Escape

    From glsamaker@gentoo.org@21:1/5 to All on Sat Jun 22 09:10:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202406-02
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Flatpak: Sandbox Escape
    Date: June 22, 2024
    Bugs: #930202
    ID: 202406-02

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Flatpak, which can lead to a
    sandbox escape.

    Background
    ==========

    Flatpak is a Linux application sandboxing and distribution framework.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------------- ------------ ------------
    sys-apps/flatpak < 1.14.6 >= 1.14.6

    Description
    ===========

    A vulnerability has been discovered in Flatpak. Please review the CVE identifier referenced below for details.

    Impact
    ======

    A malicious or compromised Flatpak app could execute arbitrary code
    outside its sandbox in conjunction with xdg-desktop-portal.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Flatpak users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-apps/flatpak-1.14.6"

    References
    ==========

    [ 1 ] CVE-2024-32462
    https://nvd.nist.gov/vuln/detail/CVE-2024-32462

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202406-02

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmZ2d9oACgkQFMQkOaVy +9nLnw/7BopGfIjPNceHKoaBOj9cm0J/rbPDaUy6tGIlhHFBZzUOuk3zCfvnknYO ZCmUKxbLPm3Bz238T0xiVe8NmLXllzDy5jeZRUlAOUeOUDWb7/lUPteVZ/GU9QJe 237gCD0SFam/k8KixYbp/mLfOxLiqjWFIJreZmPhakLzndbhzORaiRpSCh4zzHCq 80jROnfCOEFa+q60BIZa5MH5O7iMk045nIfRJnggSjc9IZ96qwgqVN+OpWfUdZKB t1PBNDHgmxrebe6eW9iNCB75yAvtWZQbDzQjnpGXMI3aHdGhEA5jD1NtWEZJQUbV AMjbel45+LSyHJiq7R4q+ikTEq6jkYFGwTdYrZgL7K21HIA+4kxZO9I+PGVLPdqg jAznTLDLZ3lcLiRd0jiw8f+Ji7c7sd1PbnVWKLNKBIuBf1eNR4Y5Eqtk2vaMANn7 UhEYzSA0Lc/nEUhVxiNkfm4yxyk2WBBPZNlG4Q4imhfAMplydOuYlBJINfWId9tg H1YW5L9nBdZRMYv5miMlIkCuU+40UOghMT6O78sV3LQaSHtiNEE946P9wCznXjZ6 dquVes54gmsSws/pxsQ78Pgc1yF3tcpNdES4U8jqPr52OflPTQwOHM/clxdjLkhY n1ZhgU7jfgp1kDj2RG8LoO+bOjDK+gD/THQfVy6JWvdiy3MQqgM=
    =sltI
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)