[Secure-testing-team] Bug#880451: flatpak: older flatpak-dbus-proxy versions allowed legacy D-Bus eavesdropping

Simon McVittie smcv at debian.org
Tue Oct 31 18:18:18 UTC 2017


Package: flatpak
Version: 0.8.5-2
Severity: important
Tags: security

In Flatpak versions prior to 0.9.9 (mainline) and 0.8.8 (0.8.x), the
flatpak-dbus-proxy that is optionally used to filter D-Bus traffic did not
forbid match rules with eavesdrop="true", as used by dbus-monitor versions
prior to 1.9.10. Such match rules could be used by a sandboxed app to
spy on non-sandboxed apps' D-Bus session bus method calls (a local
confidentiality breach).

Apps that are configured to have unrestricted D-Bus access
([Context] sockets=session-bus;, see flatpak-metadata(5)) can do this even
in later versions, but this is not considered to be a bug: unrestricted
D-Bus access is just as unrestricted as you might expect it to be.

Mitigations:
* The apps that could exploit this are not entirely untrusted (the user
  has chosen to install and run them, and in particular has given them
  access to the attack surface of the Linux kernel)
* In practical sandboxed apps, the ability to spy on X11 (which
  everything is going to need to have until Wayland is ubiquitous)
  is more sensitive than the ability to spy on D-Bus
* We can't spy on the system bus like this, because of the security
  boundary between users

My guess is that the security team is not interested in issuing a DSA
for this vulnerability and would prefer me to issue a stable update
(I'm going to ask the SRMs whether they'll accept 0.8.8 into stable,
and if not, propose a 0.8.7-2~deb9u2 version). Is my guess correct?

Thanks,
    smcv



More information about the Secure-testing-team mailing list