DSA-4984-1 flatpak -- security update

Related Vulnerabilities: CVE-2021-41133  

It was discovered that sandbox restrictions in Flatpak, an application deployment framework for desktop apps, could be bypassed for a Flatpak app with direct access to AF_UNIX sockets, by manipulating the VFS using mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter. Details can be found in the upstream advisory at https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q For the stable distribution (bullseye), this problem has been fixed in version 1.10.5-0+deb11u1. We recommend that you upgrade your flatpak packages. For the detailed security status of flatpak please refer to its security tracker page at: https://security-tracker.debian.org/tracker/flatpak

Debian Security Advisory

DSA-4984-1 flatpak -- security update

Date Reported:
12 Oct 2021
Affected Packages:
flatpak
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 995935.
In Mitre's CVE dictionary: CVE-2021-41133.
More information:

It was discovered that sandbox restrictions in Flatpak, an application deployment framework for desktop apps, could be bypassed for a Flatpak app with direct access to AF_UNIX sockets, by manipulating the VFS using mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter.

Details can be found in the upstream advisory at https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q

For the stable distribution (bullseye), this problem has been fixed in version 1.10.5-0+deb11u1.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to its security tracker page at: https://security-tracker.debian.org/tracker/flatpak