This week we take a deep dive look at 2 recent vulnerabilities in the
popular application containerisation frameworks, snapd and flatpak, plus we
cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
Show Notes
Overview
This week we take a deep dive look at 2 recent vulnerabilities in the
popular application containerisation frameworks, snapd and flatpak, plus we
cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
Flatpak sandbox escape - Flatpak isolates applications inside their own
mount / user / etc namespaces - allows sandboxed applications to
communicate with the host via various portals - ie. open a file via a
file chooser portal (aka powerbox)
Portal D-Bus service provides the ability to launch other subprocesses in
a new sandbox instance, following a NNP model (ie same or less privileges
as caller) (eg. used by sandboxed webbrowers to process untrusted content
inside less privileged subprocesses)
Would previous allow a confined process to specify various environment
variables which would then get passed to the `flatpak run` command to
launch the new subprocess in its own sandbox - so fix is to sanitize
environment variables
Possible RCE via malicious UPnP requests - could send with chunked
encoding, this would exploit a signdness bug leading to a heap buffer
overflow
Episode 91 - “CallStranger” - UPnP spec didn’t forbid subscription
requests with a URL on a different network segment - could allow an
attacker to cause a miniDLNA server to DoS a different endpoint
Improper handling of symlinks in archives could result in arbitrary file
overwrite via directory traversal - since PHP PEAR runs installer as
root, could then overwrite arbitrary files as root and priv esc / code
execution etc