MGASA-2021-0486

Source
https://advisories.mageia.org/MGASA-2021-0486.html
Import Source
https://advisories.mageia.org/MGASA-2021-0486.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0486
Related
Published
2021-10-23T10:05:28Z
Modified
2021-10-23T09:37:35Z
Summary
Updated flatpak packages fix security vulnerability
Details

Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process, by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted /.flatpak-info or make that file disappear entirely.

References
Credits

Affected packages