MGASA-2024-0356

Source
https://advisories.mageia.org/MGASA-2024-0356.html
Import Source
https://advisories.mageia.org/MGASA-2024-0356.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0356
Related
  • CVE-2024-9050
Published
2024-11-12T19:53:59Z
Modified
2024-11-11T19:42:46Z
Summary
Updated networkmanager-libreswan packages fix security vulnerability
Details

A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the "leftupdown" key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration. (CVE-2024-9050)

References
Credits

Affected packages

Mageia:9 / networkmanager-libreswan

Package

Name
networkmanager-libreswan
Purl
pkg:rpm/mageia/networkmanager-libreswan?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.24-1.mga9

Ecosystem specific

{
    "section": "core"
}