New upstream microrelease flatpak 1.0.7
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
flatpak (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Undecided
|
Unassigned | ||
Cosmic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
This is a request to SRU the latest microrelease of flatpak into bionic and cosmic. Which is also a security update similar to the runc CVE-2019-5736.
Debian bug https:/
[Impact]
New upstream microrelease of flatpak, which brings security fixes similar to the runc CVE-2019-5736.
Bionic is currently at 1.0.6, whereas 1.0.7 is available upstream.
Cosmic is currently at 1.0.6, whereas 1.0.7 is available upstream.
[Test Case]
As stated in the debian bug there isn't yet an exploit to demonstration the vulnerability, see the test plan below for testing flatpak itself.
[Regression Potential]
Flatpak has a test suite, which is run on build across all architectures and passes.
There is also a manual test plan https:/
Flatpak has autopkgtests enabled http://
Regression potential is low, and upstream is very responsive to any issues raised.
[Other information]
Debian and upstream comments about the vulnerability.
If a user installs a system-wide Flatpak app or runtime that has an 'apply_extra' script, then the apply_extra script is run in a sandbox, as root, with /proc mounted. A malicious app or runtime could traverse /proc/self/exe to modify a host-side executable.
The app or runtime would have to come from a trusted Flatpak
repository (such as Flathub) that was previously added as a system-wide
source of Flatpak apps by a root-equivalent user.
(Non-malicious apply_extra scripts are normally used to process "extra
data" files that had to be downloaded out-of-band, such as the archives
containing the proprietary Nvidia graphics drivers, which the Flathub
maintainers do not believe they are allowed to redistribute directly.)
The fix is to "Don't expose /proc in apply_extra script sandbox."
Changed in flatpak (Ubuntu): | |
assignee: | nobody → Andrew Hayzen (ahayzen) |
status: | New → In Progress |
description: | updated |
summary: |
- New upstream microrelease flatpak 1.0.X + New upstream microrelease flatpak 1.0.7 |
description: | updated |
description: | updated |
Changed in flatpak (Ubuntu): | |
status: | In Progress → Fix Released |
Changed in flatpak (Ubuntu Bionic): | |
status: | New → Confirmed |
Changed in flatpak (Ubuntu Cosmic): | |
status: | New → Confirmed |
Changed in flatpak (Ubuntu Bionic): | |
assignee: | nobody → Andrew Hayzen (ahayzen) |
Changed in flatpak (Ubuntu Cosmic): | |
assignee: | nobody → Andrew Hayzen (ahayzen) |
Changed in flatpak (Ubuntu Bionic): | |
assignee: | Andrew Hayzen (ahayzen) → nobody |
Changed in flatpak (Ubuntu Cosmic): | |
assignee: | Andrew Hayzen (ahayzen) → nobody |
Changed in flatpak (Ubuntu): | |
assignee: | Andrew Hayzen (ahayzen) → nobody |
information type: | Public → Public Security |
FYI DSA 4390-1 now tracks the security issue in Debian https:/ /lists. debian. org/debian- security- announce/ 2019/msg00030. html