flatpak-1.0.9-12.el7
エラータID: AXSA:2021-2510:07
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-41133
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
Update packages.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
N/A
SRPMS
- flatpak-1.0.9-12.el7.src.rpm
MD5: 7859b6380da3183a205a12ab4e2dfc7e
SHA-256: 12eaf140aae920d0252570b26d24ae3418f15c68b1623c780956bfe2739b7a42
Size: 3.35 MB
Asianux Server 7 for x86_64
- flatpak-1.0.9-12.el7.x86_64.rpm
MD5: c6f747b206391131ca289f5cf8daeea4
SHA-256: fb9691eeb4b31d31126eabf378640accf3658c757509cfd680eceac5d1f3f0de
Size: 957.30 kB - flatpak-builder-1.0.0-12.el7.x86_64.rpm
MD5: 2e702ac0dd7917fc0ec9248cf043f01c
SHA-256: ac8a460ef3ad6c5135153c9116a9568fb53c55421868481ddcca008d74d3d254
Size: 179.66 kB - flatpak-devel-1.0.9-12.el7.x86_64.rpm
MD5: 17dbd37dc7464eb28be72241dd6e753e
SHA-256: 8a015e7e90ec33dae1ea3b9833672d5fa10706c6bf881f492f54d0e61608a1cb
Size: 59.79 kB - flatpak-libs-1.0.9-12.el7.x86_64.rpm
MD5: b12852cf70c65b9bb15604842b9853ad
SHA-256: 8884e34b3813af8314d6a9cd61db448e99c7a03838374658d60aca0c78f7bf8a
Size: 595.72 kB