Updated flatpak packages fix security vulnerabilities
Publication date: 18 Mar 2021Modification date: 18 Mar 2021
Type: security
Affected Mageia releases : 7
CVE: CVE-2021-21261 , CVE-2021-21381
Description
Sandbox escape where a malicious application can execute code outside the sandbox by controlling the environment of the "flatpak run" command when spawning a sub-sandbox (CVE-2021-21261). A potential attack where a flatpak application could use custom formatted .desktop files to gain access to files on the host system (CVE-2021-21381). The update also removes the unnecessary flatpak-tests subpackage.
References
- https://bugs.mageia.org/show_bug.cgi?id=27126
- https://bugs.mageia.org/show_bug.cgi?id=25978
- https://bugs.mageia.org/show_bug.cgi?id=28575
- https://github.com/flatpak/flatpak/security/advisories/GHSA-4ppf-fxf6-vxg2
- https://github.com/flatpak/flatpak/security/advisories/GHSA-xgh4-387p-hqpp
- https://github.com/flatpak/flatpak/issues/4146
- https://github.com/flatpak/flatpak/releases
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2K2Q5P4IIUN2SFJKQKB4UJQ37CE2E55K/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21381
SRPMS
7/core
- libglib-testing-0.1.0-2.mga7
- appstream-glib-0.7.15-1.mga7
- malcontent-0.9.0-2.mga7
- bubblewrap-0.4.1-1.mga7
- ostree-2020.8-1.mga7
- flatpak-1.10.2-1.mga7
- gnome-software-3.32.2-2.1.mga7