Amazon Linux 2 : flatpak (ALAS-2019-1219)

critical Nessus Plugin ID 125602

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

Flatpak allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that they would be executed outside the sandbox after the sandboxed app exits. This fix was incomplete: on 64-bit platforms, the seccomp filter could be bypassed by an ioctl request number that has TIOCSTI in its 32 least significant bits and an arbitrary nonzero value in its 32 most significant bits, which the Linux kernel would treat as equivalent to TIOCSTI.(CVE-2019-10063)

Solution

Run 'yum update flatpak' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALAS-2019-1219.html

Plugin Details

Severity: Critical

ID: 125602

File Name: al2_ALAS-2019-1219.nasl

Version: 1.3

Type: local

Agent: unix

Published: 5/31/2019

Updated: 5/17/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-10063

CVSS v3

Risk Factor: Critical

Base Score: 9

Temporal Score: 7.8

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:flatpak, p-cpe:/a:amazon:linux:flatpak-libs, p-cpe:/a:amazon:linux:flatpak-debuginfo, p-cpe:/a:amazon:linux:flatpak-devel, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:flatpak-builder

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/30/2019

Vulnerability Publication Date: 3/26/2019

Reference Information

CVE: CVE-2019-10063

ALAS: 2019-1219