flatpak-1.6.2-5.el8
エラータID: AXSA:2021-1455:03
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via spawn portal (CVE-2021-21261)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
Update packages.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
N/A
SRPMS
- flatpak-1.6.2-5.el8.src.rpm
MD5: f9af6910349d00841a572cfd9e1941f6
SHA-256: 1167ca219e98949bb6b154b8d6304a29bab69091ad22f0302c05c0ce8f6cb326
Size: 1.31 MB
Asianux Server 8 for x86_64
- flatpak-1.6.2-5.el8.x86_64.rpm
MD5: e8fe359666a7edc3a1222ae92e1be326
SHA-256: 3ac85e22db4542bcafce8525a9ef81d5207a3c6093efc5b5e1198f9d89c5563e
Size: 1.47 MB - flatpak-libs-1.6.2-5.el8.x86_64.rpm
MD5: ff726f7fd079b2a282712e4e49a0e339
SHA-256: ad6ac7df8a0908bff50ac69c1cbb393b16859b14c37cb94c5d5fa21428e2feee
Size: 412.59 kB - flatpak-selinux-1.6.2-5.el8.noarch.rpm
MD5: ab179b8fbd5015a30d6562e1260a7811
SHA-256: b2f812f6de98d55efbecfaf961c452453df98ab8feaecd3aaa43eae68fbf4cb9
Size: 25.20 kB - flatpak-session-helper-1.6.2-5.el8.x86_64.rpm
MD5: 84d840b4a481d0e1c89da96f9b40e976
SHA-256: cd7a5d401ed1326eb84f32df8a162691a8b9531abe1b67ffd653177eff35a5ed
Size: 73.43 kB - flatpak-libs-1.6.2-5.el8.i686.rpm
MD5: f89b385c312ded08915e155ebb892923
SHA-256: 2e88e29a2d11e6e87d59743a89dd9550cb9cf68a0bfe3eb6b0939e21198f609b
Size: 438.39 kB