Bug 33709 - networkmanager-libreswan new security issue CVE-2024-9050
Summary: networkmanager-libreswan new security issue CVE-2024-9050
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-11-04 10:24 CET by Nicolas Salguero
Modified: 2024-11-12 21:27 CET (History)
3 users (show)

See Also:
Source RPM: networkmanager-libreswan-1.2.16-2.mga9.src.rpm
CVE: CVE-2024-9050
Status comment:


Attachments

Description Nicolas Salguero 2024-11-04 10:24:27 CET
That CVE was announced here:
https://www.openwall.com/lists/oss-security/2024/10/25/1
Nicolas Salguero 2024-11-04 10:25:05 CET

CVE: (none) => CVE-2024-9050
Whiteboard: (none) => MGA9TOO
Source RPM: (none) => networkmanager-libreswan-1.2.16-2.mga9.src.rpm
Status comment: (none) => Fixed upstream in 1.2.24

Comment 1 Lewis Smith 2024-11-04 20:21:50 CET
Note 'Status comment'.

No current maintainer, so assigning globally.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2024-11-07 14:01:11 CET
Suggested advisory:
========================

The updated package fixes a security vulnerability:

A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration. (CVE-2024-9050)

References:
https://www.openwall.com/lists/oss-security/2024/10/25/1
========================

Updated package in core/updates_testing:
========================
networkmanager-libreswan-1.2.24-1.mga9

from SRPM:
networkmanager-libreswan-1.2.24-1.mga9.src.rpm

Assignee: pkg-bugs => qa-bugs
Whiteboard: MGA9TOO => (none)
Status: NEW => ASSIGNED
Version: Cauldron => 9
Status comment: Fixed upstream in 1.2.24 => (none)

katnatek 2024-11-07 18:50:22 CET

Keywords: (none) => advisory

Comment 3 Thomas Andrews 2024-11-09 21:16:02 CET
MGA9-64 Plasma. I use Network Manager, but I do not use a libreswan VPN. My VPNs use openvpn. However, networkmanager-libswan is installed with other Network Manager VPN plugins as a dependency.

No installation issues. Using Plasma's system settings/Connections, I was able to start to add a libreswan VPN connection to the existing list, which brought up the configuration gui. I checked the different tabs, and they were OK, but since I do not have the necessary information, I was, of course, unable to actually set up the VPN. I backed out. The update doesn't seem to affect my normal use of Network Manager in any way.

Previous updates involving libreswan were approved based on a clean install, and I don't see any reason why this one should be different.

Validating.

Whiteboard: (none) => MGA9-64-OK
Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 4 Dan Fandrich 2024-11-12 07:12:32 CET
This package was pushed today but for some reason this bug wasn't automatically closed.

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED
CC: (none) => dan

Comment 5 Mageia Robot 2024-11-12 21:27:05 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0356.html

Note You need to log in before you can comment on or make changes to this bug.