SUSE SLED15 / SLES15 / openSUSE 15 : Recommended update for bubblewrap, flatpak, wayland-protocols (SUSE-SU-SUSE-RU-2025:0145-1)

critical Nessus Plugin ID 214292

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-SUSE-RU-2025:0145-1 advisory.

This update for bubblewrap, flatpak updates flatpak to 1.16.0.

flatpak changes:

- Update to version 1.16.0:

- Bug fixes:

- Update libglnx to 2024-12-06:

. Fix an assertion failure if creating a parent directory encounters a dangling symlink.
. Fix a Meson warning.
. Don't emit terminal progress indicator escape sequences by default. They are interpreted as notifications by some terminal emulators.
- Fix introspection annotations in libflatpak.

- Enhancements:

- Add the FLATPAK_TTY_PROGRESS environment variable, which re-enables the terminal progress indicator escape sequences added in 1.15.91.
- Document the FLATPAK_FANCY_OUTPUT environment variable, which allows disabling the fancy formatting when outputting to a terminal.

Update to version 1.15.91 (unstable):

- Enhancements:

- Add the FLATPAK_DATA_DIR environment variable, which allows overriding at runtime the data directory location that Flatpak uses to search for configuration files such as remotes. This is useful for running tests, and for when installing using Flatpak in a chroot.
- Add a FLATPAK_DOWNLOAD_TMPDIR variable. This allows using download directories other than /var/tmp.
- Emit progress escape sequence. This can be used by terminal emulators to detect and display progress of Flatpak operations on their graphical user interfaces.

- Bug fixes:

- Install missing test data. This should fix 'as-installed' tests via ginsttest-runner, used for example in Debian's autopkgtest framework.
- Unify and improve how the Wayland socket is passed to the sandboxed app. This should fix a regression that is triggered by compositors that both implement the security-context-v1 protocol, and sets the WAYLAND_DISPLAY environment variable when launching Flatpak apps.
- Fix the plural form of a translatable string.

Update to version 1.15.12:

- Return to using the process ID of the Flatpak app in the cgroup name. Using the instance ID in 1.15.11 caused crashes when installing apps, extensions or runtimes that use the 'extra data' mechanism, which does not set up an instance ID.

Changes from version 1.15.11:

- Dependencies:

- In distributions that compile Flatpak to use a separate xdg-dbus-proxy executable, version 0.1.6 is recommended (but not required).
- The minimum xdg-dbus-proxy continues to be 0.1.0.

- Enhancements:

- Allow applications like WebKit to connect the AT-SPI accessibility tree of processes in a sub-sandbox with the tree in the main process.
. New sandboxing parameter flatpak run --a11y-own-name, which is like --own-name but for the accessibility bus.
. flatpak-portal API v7: add new sandbox-a11y-own-names option, which accepts names matching ${FLATPAK_ID}.* . Apps may call the org.a11y.atspi.Socket.Embedded method on names matching ${FLATPAK_ID}.Sandboxed.* by default . flatpak run -vv $app_id shows all applicable sandboxing parameters and their source, including overrides, as debug messages
- Introduce USB device listing . Apps can list which USB devices they want to access ahead of time by using the --usb parameter. Check the manpages for the more information about the accepted syntax.
. Denying access to USB devices is also possible with the
--no-usb parameter. The syntax is equal to --usb.
. Both options merely store metadata, and aren't used by Flatpak itself. This metadata is intended to be used by the (as of now, still in progress) USB portal to decide which devices the app can enumerate and request access.
- Add support for KDE search completion
- Use the instance id of the Flatpak app as part of the cgroup name. This better matches the naming conventions for cgroup.

- Bug fixes:

- Update libglnx to 2024-08-23
- fix build in environments that use -Werror=return-type, such as openSUSE Tumbleweed
- add a fallback definition for G_PID_FORMAT with older GLib
- avoid warnings for g_steal_fd() with newer GLib
- improve compatibility of g_closefrom() backport with newer GLib
- Update meson wrap file for xdg-dbus-proxy to version 0.1.6:
- compatibility with D-Bus implementations that pipeline the authentication handshake, such as sd-bus and zbus
- compatibility with D-Bus implementations that use non-consecutive serial numbers, such as godbus and zbus
- broadcast signals can be allowed without having to add TALK permission
- fix memory leaks

- Internal changes:

- Better const-correctness
- Fix a shellcheck warning in the tests

- add weak dep on p11-kit-server for certificate transfer (boo#1188902)
- disable parental controls for now by using '-Dmalcontent=disabled', to work around issues with xdg-desktop-portal

Update to version 1.14.10:

- Dependencies: In distributions that compile Flatpak to use a separate bubblewrap (bwrap) executable, either version 0.10.0, version 0.6.x 0.6.3, or a version with a backport of the
--bind-fd option is required. These versions add a new feature which is required by the security fix in this release.
- Security fixes: Don't follow symbolic links when mounting persistent directories (--persist option). This prevents a sandbox escape where a malicious or compromised app could edit the symlink to point to a directory that the app should not have been allowed to read or write. (bsc#1229157, CVE-2024-42472, GHSA-7hgv-f2j8-xw87)
- Documentation: Mark the 1.12.x and 1.10.x branches as end-of-life (#5352)
- Version 1.14.9 was not released due to an incompatibility with older versions of GLib. Version 1.14.10 replaces it.

Update to version 1.14.8:

- No changes. This release is rolling out to correct mismatching submodule versions in the release tarball.

Update to version 1.14.7:

- New features: Automatically reload D-Bus session bus configuration after installing or upgrading apps, to pick up any exported D-Bus services (#3342)
- Bug fixes:
- Expand the list of environment variables that Flatpak apps do not inherit from the host system (#5765, #5785)
- Don't refuse to start apps when there is no D-Bus system bus available (#5076)
- Don't try to repeat migration of apps whose data was migrated to a new name and then deleted (#5668)
- Fix warnings from newer GLib versions (#5660)
- Always set the container environment variable (#5610)
- In flatpak ps, add xdg-desktop-portal-gnome to the list of backends we'll use to learn which apps are running in the background (#5729)
- Avoid leaking a temporary variable from /etc/profile.d/flatpak.sh into the shell environment (#5574)
- Avoid undefined behaviour of signed left-shift when storing object IDs in a hash table (#5738)
- Fix Docbook validity in documentation (#5719)
- Skip more tests when FUSE isn't available (#5611)
- Fix a misleading comment in the test for CVE-2024-32462 (#5779)
- Internal changes:
- Fix Github Workflows recipes

Update to version 1.14.6:

- Security fixes:
- Don't allow an executable name to be misinterpreted as a command-line option for bwrap(1). This prevents a sandbox escape where a malicious or compromised app could ask xdg-desktop-portal to generate a .desktop file with access to files outside the sandbox. (CVE-2024-32462, bsc#1223110)
- Other bug fixes:
- Don't parse <developer><name/></developer> as the application name (#5700)

bubblewrap changes:

Update to 0.11.0:

* New --overlay, --tmp-overlay, --ro-overlay and --overlay-src options allow creation of overlay mounts. This feature is not available when bubblewrap is installed setuid.
* New --level-prefix option produces output that can be parsed by tools like logger --prio-prefix and systemd-cat --level-prefix=1
* bug fixes and developer visible changes

Update to version v0.10.0:

* New features: Add the --[ro-]bind-fd option, which can be used to mount a filesystem represented by a file descriptor without time-of-check/time-of-use attacks. This is needed when resolving security issue in Flatpak.
(CVE-2024-42472, bsc#1229157)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://www.suse.com/security/cve/CVE-2024-32462

https://bugzilla.suse.com/1212476

https://www.suse.com/security/cve/CVE-2024-42472

https://bugzilla.suse.com/1188902

https://bugzilla.suse.com/1216320

https://lists.suse.com/pipermail/sle-updates/2025-January/038111.html

Plugin Details

Severity: Critical

ID: 214292

File Name: suse_SU-RU-2025-0145-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/17/2025

Updated: 1/17/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-32462

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-42472

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:bubblewrap, p-cpe:/a:novell:suse_linux:flatpak, p-cpe:/a:novell:suse_linux:flatpak-devel, p-cpe:/a:novell:suse_linux:libflatpak0, p-cpe:/a:novell:suse_linux:flatpak-zsh-completion, p-cpe:/a:novell:suse_linux:system-user-flatpak, p-cpe:/a:novell:suse_linux:typelib-1_0-flatpak-1_0, p-cpe:/a:novell:suse_linux:flatpak-remote-flathub, p-cpe:/a:novell:suse_linux:bubblewrap-zsh-completion, p-cpe:/a:novell:suse_linux:wayland-protocols-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2025

Vulnerability Publication Date: 4/18/2024

Reference Information

CVE: CVE-2024-32462, CVE-2024-42472

SuSE: SUSE-RU-2025:0145-1