New upstream microrelease flatpak 1.0.8
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
flatpak (Ubuntu) |
Fix Released
|
Low
|
Andrew Hayzen | ||
Bionic |
Fix Released
|
Low
|
Unassigned | ||
Cosmic |
Fix Released
|
Low
|
Unassigned |
Bug Description
This is a request to SRU the latest microrelease of flatpak into bionic and cosmic. Which is also a security update for CVE-2019-10063.
Debian bug https:/
Upstream bug https:/
[Impact]
New upstream microrelease of flatpak, which brings a security fix for CVE-2019-10063.
Bionic is currently at 1.0.7, whereas 1.0.8 is available upstream.
Cosmic is currently at 1.0.7, whereas 1.0.8 is available upstream.
Disco needs to be synced to >= 1.2.3-2 (is someone able to sync 1.2.4-1 from unstable ? ) bug 1822024 has this request.
[Test Case]
No test case has been mentioned in the Debian bug, in the upstream pull request it looks like the snapd exploit might be able to be used https:/
[Regression Potential]
Flatpak has a test suite, which is run on build across all architectures and passes.
There is also a manual test plan https:/
Flatpak has autopkgtests enabled http://
Regression potential is low, and upstream is very responsive to any issues raised.
[Other information]
Debian and upstream comments about the vulnerability.
"flatpak versions since 0.8.1 (and Debian's 0.8.0-2, which has backports
of the upstream changes that became 0.8.1) attempt to prevent malicious
apps from escalating their privileges by injecting commands into the
controlling terminal with the TIOCSTI ioctl (CVE-2017-5226).
This fix was incomplete: on 64-bit platforms, seccomp looks at the whole
64-bit word, but the kernel only looks at the low 32 bits. This means we
also have to block commands like (0x1234567800000000 | TIOCSTI).
CVE-2019-10063 has been allocated for this vulnerability, which closely
resembles CVE-2019-7303 in snapd.
Mitigation: as usual with Flatpak sandbox bypasses, this can only be
exploited if you install a malicious app from a trusted source. The
sandbox parameters used for most apps are currently sufficiently weak
that a malicious app could do other equally bad things that we cannot
prevent, for example by abusing the X11 protocol."
Debian security tracker https:/
CVE References
Changed in flatpak (Ubuntu): | |
assignee: | nobody → Andrew Hayzen (ahayzen) |
information type: | Public → Public Security |
Changed in flatpak (Ubuntu): | |
status: | New → In Progress |
Changed in flatpak (Ubuntu): | |
status: | Confirmed → Fix Released |
tags: | added: upgrade-software-version |
Changed in flatpak (Ubuntu): | |
importance: | Undecided → Low |
Changed in flatpak (Ubuntu Bionic): | |
importance: | Undecided → Low |
Changed in flatpak (Ubuntu Cosmic): | |
importance: | Undecided → Low |
This has been fixed in disco as per version 1.2.4-1. Is someone able to nominate this bug for bionic and cosmic, and mark the main bug as fixed released. (I don't have permission to nominate for series)