flatpak-1.0.9-11.el7
エラータID: AXSA:2021-1620:05
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-21381
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`.
Update packages.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`.
N/A
SRPMS
- flatpak-1.0.9-11.el7.src.rpm
MD5: b444edaa3b0a66b8872d6c6d67439c60
SHA-256: 41dfefda2e25ff3a74f02d2b932a77d9279d2186084cfb12fee336fe95b9d08b
Size: 3.34 MB
Asianux Server 7 for x86_64
- flatpak-1.0.9-11.el7.x86_64.rpm
MD5: 24cf244dcfd33042a571761cf8414863
SHA-256: 7a5841548780e903c28745418138b68172ebf2f35a1c86a607d5e903bb0adf48
Size: 956.86 kB - flatpak-builder-1.0.0-11.el7.x86_64.rpm
MD5: cbffecb13c2b7be255001069a68e9084
SHA-256: 5637d16bd25e1a727d1397e29e7297187b84f0e525970e68824d09ef4fada4cc
Size: 179.55 kB - flatpak-devel-1.0.9-11.el7.x86_64.rpm
MD5: 4041ada3042de247ed812ab59f91f9f6
SHA-256: a1cc133e6d3cec12666b6ed94911cf5345ac8cb5cc9ebffd7f224362565a932c
Size: 59.71 kB - flatpak-libs-1.0.9-11.el7.x86_64.rpm
MD5: 0cc36d6873d0b42ba5a008fbec730c25
SHA-256: 183ae76aa0f851d16d5ddbfa8539d388ded85b1e678ec182420211ab8a5e614a
Size: 595.29 kB