Bug 2313828 (CVE-2024-9050) - CVE-2024-9050 NetworkManager-libreswan: Local privilege escalation via leftupdown
Summary: CVE-2024-9050 NetworkManager-libreswan: Local privilege escalation via leftup...
Keywords:
Status: VERIFIED
Alias: CVE-2024-9050
Deadline: 2024-10-22
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2320956
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-20 18:30 UTC by OSIDB Bzimport
Modified: 2025-04-11 10:57 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:8312 0 None None None 2024-10-22 12:22:50 UTC
Red Hat Product Errata RHSA-2024:8338 0 None None None 2024-10-22 18:15:30 UTC
Red Hat Product Errata RHSA-2024:8352 0 None None None 2024-10-23 10:17:19 UTC
Red Hat Product Errata RHSA-2024:8353 0 None None None 2024-10-23 10:07:51 UTC
Red Hat Product Errata RHSA-2024:8354 0 None None None 2024-10-23 10:09:32 UTC
Red Hat Product Errata RHSA-2024:8355 0 None None None 2024-10-23 10:12:25 UTC
Red Hat Product Errata RHSA-2024:8356 0 None None None 2024-10-23 09:59:51 UTC
Red Hat Product Errata RHSA-2024:8357 0 None None None 2024-10-23 10:02:59 UTC
Red Hat Product Errata RHSA-2024:8358 0 None None None 2024-10-23 10:00:57 UTC
Red Hat Product Errata RHSA-2024:9555 0 None None None 2024-11-13 15:18:56 UTC
Red Hat Product Errata RHSA-2024:9556 0 None None None 2024-11-13 15:45:26 UTC

Description OSIDB Bzimport 2024-09-20 18:30:55 UTC
A security issue in NM-libreswan, where we fail to sanitize the VPN configuration from a local unprivileged user and pass it directly to Libreswan.

The libreswan connection configuration is simple key=value format, but we fail to check for or escape special characters, including newlines, which makes it possible for the user to trick us to treat values as key.

Unfortunately, there's one particular key that takes an executable command as an argument: leftupdown (couldn't find more in ipsec.conf(5)). We normally use it to specify the NM-libreswan callback, that would pass L3 configuration back to NM. It can be abused to execute arbitrary code.

Comment 4 errata-xmlrpc 2024-10-22 12:22:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:8312 https://access.redhat.com/errata/RHSA-2024:8312

Comment 5 errata-xmlrpc 2024-10-22 18:15:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Advanced Update Support

Via RHSA-2024:8338 https://access.redhat.com/errata/RHSA-2024:8338

Comment 6 errata-xmlrpc 2024-10-23 09:59:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:8356 https://access.redhat.com/errata/RHSA-2024:8356

Comment 7 errata-xmlrpc 2024-10-23 10:00:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:8358 https://access.redhat.com/errata/RHSA-2024:8358

Comment 8 errata-xmlrpc 2024-10-23 10:02:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2024:8357 https://access.redhat.com/errata/RHSA-2024:8357

Comment 9 errata-xmlrpc 2024-10-23 10:07:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:8353 https://access.redhat.com/errata/RHSA-2024:8353

Comment 10 errata-xmlrpc 2024-10-23 10:09:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:8354 https://access.redhat.com/errata/RHSA-2024:8354

Comment 11 errata-xmlrpc 2024-10-23 10:12:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:8355 https://access.redhat.com/errata/RHSA-2024:8355

Comment 12 errata-xmlrpc 2024-10-23 10:17:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:8352 https://access.redhat.com/errata/RHSA-2024:8352

Comment 14 errata-xmlrpc 2024-11-13 15:18:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:9555 https://access.redhat.com/errata/RHSA-2024:9555

Comment 15 errata-xmlrpc 2024-11-13 15:45:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2024:9556 https://access.redhat.com/errata/RHSA-2024:9556


Note You need to log in before you can comment on or make changes to this bug.