Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-32462
HistoryApr 18, 2024 - 12:00 a.m.

CVE-2024-32462

2024-04-1800:00:00
ubuntu.com
ubuntu.com
13
flatpak
sandbox escape
bwrap
security vulnerability
linux
xdg-desktop-portal
cve-2024-32462

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%

Flatpak is a system for building, distributing, and running sandboxed
desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6,
and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary
code outside its sandbox. Normally, the --command argument of flatpak run expects to be given a command to run in the specified Flatpak app,
optionally along with some arguments. However it is possible to instead
pass bwrap arguments to --command=, such as --bind. It’s possible to
pass an arbitrary commandline to the portal interface
org.freedesktop.portal.Background.RequestBackground from within a Flatpak
app. When this is converted into a --command and arguments, it achieves
the same effect of passing arguments directly to bwrap, and thus can be
used for a sandbox escape. The solution is to pass the -- argument to
bwrap, which makes it stop processing options. This has been supported
since bubblewrap 0.3.0. All supported versions of Flatpak require at least
that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate
this vulnerability by only allowing Flatpak apps to create .desktop files
for commands that do not start with --. The vulnerability is patched in
1.15.8, 1.10.9, 1.12.9, and 1.14.6.

Bugs

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%