Bug ID 1232040
Summary VUL-0: CVE-2024-9050: NetworkManager-libreswan: improper sanitization of the VPN configuration of a local unprivileged user can lead to local privilege escalation via the leftupdown key
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/425285/
OS Other
Status NEW
Severity Major
Priority P5 - None
Component Security
Assignee dimstar@opensuse.org
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

A flaw was found in the libreswan client plugin for NetworkManager
(NetkworkManager-libreswan), where it fails to properly sanitize the VPN
configuration from the local unprivileged user. In this configuration, composed
by a key-value format, the plugin fails to escape special characters, leading
the application to interpret values as keys. One of the most critical
parameters that could be abused by a malicious user is the `leftupdown`key.
This key takes an executable command as a value and is used to specify what
executes as a callback in NetworkManager-libreswan to retrieve configuration
settings back to NetworkManager. As NetworkManager uses Polkit to allow an
unprivileged user to control the system's network configuration, a malicious
actor could achieve local privilege escalation and potential code execution as
root in the targeted machine.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-9050
https://bugzilla.redhat.com/show_bug.cgi?id=2313828
https://www.cve.org/CVERecord?id=CVE-2024-9050
https://access.redhat.com/security/cve/CVE-2024-9050
https://access.redhat.com/errata/RHSA-2024:8312


You are receiving this mail because: