flatpak-1.8.5-4.el8
エラータID: AXSA:2021-2511:08
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-41133
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
Update packages.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
N/A
SRPMS
- flatpak-1.8.5-4.el8.src.rpm
MD5: b2858eff9ca7a499e0614110e7af6854
SHA-256: 6754707b79fab022112735f995e4ba18fce7db379e0fc2461e69f246af8499e0
Size: 1.39 MB
Asianux Server 8 for x86_64
- flatpak-1.8.5-4.el8.x86_64.rpm
MD5: 91e141f522336ccb8f8e765645f99abc
SHA-256: ff24aa977a8df712d43f3fb51f0c80915156d4b25dda2995b2dad2823e2c0683
Size: 1.60 MB - flatpak-libs-1.8.5-4.el8.x86_64.rpm
MD5: a08256b7ce20def415737f9e36b0904a
SHA-256: 6ecdd24615c75cdae02b522786f07a5fb91560fa684aa918d5e44911583f6510
Size: 438.77 kB - flatpak-selinux-1.8.5-4.el8.noarch.rpm
MD5: 09ec567b3cb7b22c0fc892a3e463d2ff
SHA-256: 293f18fa27f44db61b4887ec9ad672349ccefc3ee08c22677550f83347d936e9
Size: 25.82 kB - flatpak-session-helper-1.8.5-4.el8.x86_64.rpm
MD5: 6acc724f0e83eda06f6e8b3d8f0677f4
SHA-256: 7ec7d4271898b940ce31a21bd1cf96b3e97388f958d4182b80285cfc52da4ccc
Size: 73.91 kB - flatpak-libs-1.8.5-4.el8.i686.rpm
MD5: 1a74359ad82c71ad6cb374957683d4ab
SHA-256: d32a9fae1b4bc24f626a12870e366330deb0cc8a4345c86941511202fc3f8f22
Size: 457.40 kB