MGASA-2021-0486 - Updated flatpak packages fix security vulnerability

Publication date: 23 Oct 2021
URL: https://advisories.mageia.org/MGASA-2021-0486.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-41133

Flatpak apps with direct access to AF_UNIX sockets such as those used by
Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS
services into treating the Flatpak app as though it was an ordinary,
non-sandboxed host-OS process, by manipulating the VFS using recent
mount-related syscalls that are not blocked by Flatpak's denylist seccomp
filter, in order to substitute a crafted /.flatpak-info or make that file
disappear entirely.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29543
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/R5656ONDP2MGKIJMKEC7N2NXCV27WGTC/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133

SRPMS:
- 8/core/flatpak-1.10.5-1.mga8