vuln-list-alt/oval/p10/ALT-PU-2021-3551/definitions.json
2024-04-16 14:26:14 +00:00

144 lines
6.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213551",
"Version": "oval:org.altlinux.errata:def:20213551",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3551: package `flatpak` update to version 1.12.2-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3551",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3551",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00259",
"RefURL": "https://bdu.fstec.ru/vul/2022-00259",
"Source": "BDU"
},
{
"RefID": "CVE-2021-41133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41133",
"Source": "CVE"
}
],
"Description": "This update upgrades flatpak to version 1.12.2-alt2. \nSecurity Fix(es):\n\n * BDU:2022-00259: Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-41133: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.\n\n * #41495: Сделать исполняемым /etc/profile.d/flatpak.sh",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-12-17"
},
"Updated": {
"Date": "2021-12-17"
},
"BDUs": [
{
"ID": "BDU:2022-00259",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-00259",
"Impact": "High",
"Public": "20210915"
}
],
"CVEs": [
{
"ID": "CVE-2021-41133",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41133",
"Impact": "High",
"Public": "20211008"
}
],
"Bugzilla": [
{
"ID": "41495",
"Href": "https://bugzilla.altlinux.org/41495",
"Data": "Сделать исполняемым /etc/profile.d/flatpak.sh"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213551001",
"Comment": "flatpak is earlier than 0:1.12.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213551002",
"Comment": "libflatpak is earlier than 0:1.12.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213551003",
"Comment": "libflatpak-devel is earlier than 0:1.12.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213551004",
"Comment": "libflatpak-devel-doc is earlier than 0:1.12.2-alt2"
}
]
}
]
}
}
]
}