** Description changed:

- Placeholder for a future flatpak 1.0.X release for bionic and cosmic.
+ This is a request to SRU the latest microrelease of flatpak into bionic
+ and cosmic. Which is also a security update for CVE-2019-10063.
+ 
+ Debian bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925541
+ Upstream bug https://github.com/flatpak/flatpak/issues/2782
+ 
+ [Impact]
+ 
+ New upstream microrelease of flatpak, which brings a security fix for
+ CVE-2019-10063.
+ 
+ Bionic is currently at 1.0.7, whereas 1.0.8 is available upstream.
+ Cosmic is currently at 1.0.7, whereas 1.0.8 is available upstream.
+ 
+ Disco needs to be synced to >= 1.2.3-2  (is someone able to sync 1.2.4-1
+ from unstable ? ) bug 1822024 has this request.
+ 
+ [Test Case]
+ 
+ No test case has been mentioned in the Debian bug, in the upstream pull
+ request it looks like the snapd exploit might be able to be used
+ https://www.exploit-db.com/exploits/46594 but the code change is minimal
+ so I have not tried this yet.
+ 
+ [Regression Potential]
+ 
+ Flatpak has a test suite, which is run on build across all architectures
+ and passes.
+ 
+ There is also a manual test plan
+ https://wiki.ubuntu.com/Process/Merges/TestPlan/flatpak. I have
+ confirmed that 1.0.8 passes with this test plan on both bionic and
+ cosmic.
+ 
+ Flatpak has autopkgtests enabled
+ http://autopkgtest.ubuntu.com/packages/f/flatpak which is passing on
+ bionic and cosmic.
+ 
+ Regression potential is low, and upstream is very responsive to any
+ issues raised.
+ 
+ [Other information]
+ 
+ Debian and upstream comments about the vulnerability.
+ 
+ "flatpak versions since 0.8.1 (and Debian's 0.8.0-2, which has backports
+ of the upstream changes that became 0.8.1) attempt to prevent malicious
+ apps from escalating their privileges by injecting commands into the
+ controlling terminal with the TIOCSTI ioctl (CVE-2017-5226).
+ 
+ This fix was incomplete: on 64-bit platforms, seccomp looks at the whole
+ 64-bit word, but the kernel only looks at the low 32 bits. This means we
+ also have to block commands like (0x1234567800000000 | TIOCSTI).
+ CVE-2019-10063 has been allocated for this vulnerability, which closely
+ resembles CVE-2019-7303 in snapd.
+ 
+ Mitigation: as usual with Flatpak sandbox bypasses, this can only be
+ exploited if you install a malicious app from a trusted source. The
+ sandbox parameters used for most apps are currently sufficiently weak
+ that a malicious app could do other equally bad things that we cannot
+ prevent, for example by abusing the X11 protocol."
+ 
+ Debian security tracker https://security-
+ tracker.debian.org/tracker/CVE-2019-10063

** Attachment added: "Flatpak bionic 1.0.7-0ubuntu0.18.04.1 to 
1.0.8-0ubuntu0.18.04.1 debdiff.gz"
   
https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1821811/+attachment/5250333/+files/flatpak_1.0.7-0ubuntu0.18.04.1_to_flatpak_1.0.8-0ubuntu0.18.04.1.debdiff.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821811

Title:
  New upstream microrelease flatpak 1.0.X

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1821811/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to