[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4830-1 flatpak -- flatpak

ID: oval:org.secpod.oval:def:69850Date: (C)2021-03-07   (M)2023-12-26
Class: PATCHFamily: unix




Simon McVittie discovered a bug in the flatpak-portal service that can allow sandboxed applications to execute arbitrary code on the host system . The Flatpak portal D-Bus service allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the flatpak run command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the flatpak run command, and use them to execute arbitrary code that is not in a sandbox.

Platform:
Linux Mint 4
Product:
flatpak
Reference:
DSA-4830-1
CVE-2021-21261
CVE    1
CVE-2021-21261
CPE    2
cpe:/o:linux_mint:linux_mint:4
cpe:/a:flatpak:flatpak

© SecPod Technologies