Updated flatpak packages fix security vulnerability
Publication date: 23 Oct 2021Modification date: 23 Oct 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-41133
Description
Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process, by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted /.flatpak-info or make that file disappear entirely.
References
- https://bugs.mageia.org/show_bug.cgi?id=29543
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/R5656ONDP2MGKIJMKEC7N2NXCV27WGTC/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133
SRPMS
8/core
- flatpak-1.10.5-1.mga8