NA

CVE-2024-1929

Published: 08/05/2024 Updated: 08/05/2024

Vulnerability Summary

Local Root Exploit via Configuration Dictionary in dnf5daemon-server prior to 5.1.17 allows a malicious user to impact Confidentiality and Integrity via Configuration Dictionary. There are issues with the D-Bus interface long before Polkit is invoked. The `org.rpm.dnf.v0.SessionManager.open_session` method takes a key/value map of configuration entries. A sub-entry in this map, placed under the "config" key, is another key/value map. The configuration values found in it will be forwarded as configuration overrides to the `libdnf5::Base` configuration.  Practically all libdnf5 configuration aspects can be influenced here. Already when opening the session via D-Bus, the libdnf5 will be initialized using these override configuration values. There is no sanity checking of the content of this "config" map, which is untrusted data. It is possible to make the library loading a plug-in shared library under control of an unprivileged user, hence achieving root access. 

Vulnerability Trend

Mailing Lists

Hello list, CVE-2024-1929 that we previously reported [1] for the dnf5 D-Bus component has not been completely fixed This post deals with the remaining issue we discovered We offer this report also as a rendered HTML version on our blog [8] Unsafe Configuration Item "reposdir" in Whitelist ================================================= Th ...
Hello list, please find below a report about a local root exploit and other issues in dnf5daemon-server We also offer a rendered HTML version of the report on our blog [1] 1) Introduction =============== The dnf5daemon-server [2] component offers a collection of D-Bus interfaces to interact with the dnf5 package manager on the system An openS ...