Headline
Ubuntu Security Notice USN-7046-1
Ubuntu Security Notice 7046-1 - It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it would not normally have access to. A patch was also needed to Bubblewrap in order to avoid race conditions caused by this fix.
==========================================================================
Ubuntu Security Notice USN-7046-1
September 30, 2024
bubblewrap, flatpak vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Flatpak could be made to read and write files in locations it
would not normally have access to.
Software Description:
- bubblewrap: utility for unprivileged chroot and namespace manipulation
- flatpak: Application deployment framework for desktop apps
Details:
It was discovered that Flatpak incorrectly handled certain persisted
directories. An attacker could possibly use this issue to read
and write files in locations it would not normally have access to.
A patch was also needed to Bubblewrap in order to avoid race
conditions caused by this fix.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
bubblewrap 0.9.0-1ubuntu0.1
flatpak 1.14.6-1ubuntu0.1
libflatpak0 1.14.6-1ubuntu0.1
Ubuntu 22.04 LTS
bubblewrap 0.6.1-1ubuntu0.1
flatpak 1.12.7-1ubuntu0.1
libflatpak0 1.12.7-1ubuntu0.1
Ubuntu 20.04 LTS
bubblewrap 0.4.0-1ubuntu4.1
flatpak 1.6.5-0ubuntu0.5
libflatpak0 1.6.5-0ubuntu0.5
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7046-1
CVE-2024-42472, https://launchpad.net/bugs/2077087
Package Information:
https://launchpad.net/ubuntu/+source/bubblewrap/0.9.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/flatpak/1.14.6-1ubuntu0.1
https://launchpad.net/ubuntu/+source/bubblewrap/0.6.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/flatpak/1.12.7-1ubuntu0.1
https://launchpad.net/ubuntu/+source/bubblewrap/0.4.0-1ubuntu4.1
https://launchpad.net/ubuntu/+source/flatpak/1.6.5-0ubuntu0.5
Related news
Red Hat Security Advisory 2024-6421-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Security Advisory 2024-6422-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.
Red Hat Security Advisory 2024-6420-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Security Advisory 2024-6419-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Security Advisory 2024-6418-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
Red Hat Security Advisory 2024-6417-03 - An update for flatpak is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Security Advisory 2024-6357-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Security Advisory 2024-6356-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 9.
Red Hat Security Advisory 2024-6355-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Debian Linux Security Advisory 5749-1 - Chris Williams discovered a flaw in the handling of mounts for persistent directories in Flatpak, an application deployment framework for desktop apps. A malicious or compromised Flatpak app using persistent directories could take advantage of this flaw to access files outside of the sandbox.