flatpak-1.8.5-4.el8

エラータID: AXSA:2021-2511:08

Release date: 
Monday, November 1, 2021 - 16:54
Subject: 
flatpak-1.8.5-4.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

Security Fix(es):

* flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-41133
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. flatpak-1.8.5-4.el8.src.rpm
    MD5: b2858eff9ca7a499e0614110e7af6854
    SHA-256: 6754707b79fab022112735f995e4ba18fce7db379e0fc2461e69f246af8499e0
    Size: 1.39 MB

Asianux Server 8 for x86_64
  1. flatpak-1.8.5-4.el8.x86_64.rpm
    MD5: 91e141f522336ccb8f8e765645f99abc
    SHA-256: ff24aa977a8df712d43f3fb51f0c80915156d4b25dda2995b2dad2823e2c0683
    Size: 1.60 MB
  2. flatpak-libs-1.8.5-4.el8.x86_64.rpm
    MD5: a08256b7ce20def415737f9e36b0904a
    SHA-256: 6ecdd24615c75cdae02b522786f07a5fb91560fa684aa918d5e44911583f6510
    Size: 438.77 kB
  3. flatpak-selinux-1.8.5-4.el8.noarch.rpm
    MD5: 09ec567b3cb7b22c0fc892a3e463d2ff
    SHA-256: 293f18fa27f44db61b4887ec9ad672349ccefc3ee08c22677550f83347d936e9
    Size: 25.82 kB
  4. flatpak-session-helper-1.8.5-4.el8.x86_64.rpm
    MD5: 6acc724f0e83eda06f6e8b3d8f0677f4
    SHA-256: 7ec7d4271898b940ce31a21bd1cf96b3e97388f958d4182b80285cfc52da4ccc
    Size: 73.91 kB
  5. flatpak-libs-1.8.5-4.el8.i686.rpm
    MD5: 1a74359ad82c71ad6cb374957683d4ab
    SHA-256: d32a9fae1b4bc24f626a12870e366330deb0cc8a4345c86941511202fc3f8f22
    Size: 457.40 kB