drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Flatpak
Name: |
Ausführen beliebiger Kommandos in Flatpak |
|
ID: |
USN-4721-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10 |
|
Datum: |
Do, 4. Februar 2021, 23:40 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261 |
|
Applikationen: |
Flatpak |
|
Originalnachricht |
--===============2787500768356188914== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="c2dhp6q4lo2t2rp5" Content-Disposition: inline
--c2dhp6q4lo2t2rp5 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4721-1 February 04, 2021
flatpak vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Flatpak could be made to crash or run programs if it received specially crafted input.
Software Description: - flatpak: Application deployment framework for desktop apps
Details:
Simon McVittieg discovered that flatpak-portal service allowed sandboxed applications to execute arbitrary code on the host system (a sandbox escape). A malicious user could create a Flatpak application that set environment variables, trusted by the Flatpak "run" command, and use it to execute arbitrary code outside the sandbox.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: flatpak 1.8.2-1ubuntu0.1 libflatpak0 1.8.2-1ubuntu0.1
Ubuntu 20.04 LTS: flatpak 1.6.5-0ubuntu0.2 libflatpak0 1.6.5-0ubuntu0.2
Ubuntu 18.04 LTS: flatpak 1.0.9-0ubuntu0.2 libflatpak0 1.0.9-0ubuntu0.2
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4721-1 CVE-2021-21261
Package Information: https://launchpad.net/ubuntu/+source/flatpak/1.8.2-1ubuntu0.1 https://launchpad.net/ubuntu/+source/flatpak/1.6.5-0ubuntu0.2 https://launchpad.net/ubuntu/+source/flatpak/1.0.9-0ubuntu0.2
--c2dhp6q4lo2t2rp5 Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEkCdEQ5T6DutSveCybUp5kL3izGYFAmAcVxIACgkQbUp5kL3i zGbQkg//etgvVjbXEtO7wGxQohd+uo+DYg8eHKcEbzbugEXT/rF53WjDe4zjmw5V LTI2A9j/6CkvRFGLvUDDTslS75bCVIobhARNq4bKF8UbkLkbD7RubvNzIM9E2Iu7 iFqt0mNqo7Sol/yoQvt/krp4yGaBKlsZRLEosQ8OVMFDnqGMVPTNyBe3OKXy9Cct NlM0Vw5GfqKdWYjt3kdlSfn5h+QgzSdGDYESCO0ovmiAIWlfRLr14XFjpPOkMVak jmgLvf5N3veQcwInxRX0/zUunl1s1QIi0OgFBedsA26k4S5ABa94EO/Luq+2x3TC S42QOm1uVDRERTKHoqJUD9nPONpAJ6t7VDXzAOhXO0PmyAkB4Rly+nXi/PcwfAI6 pyP/QkX3n4y4obt1YkecaUdE7FULaUD/u1ZlCFfK3aGBGQJfzDQU5E2mHd2VHQf7 q9C4GUyzqT1jUagL1VWO/xLY4yZZRaiywP662Zx5YykkDQCiJTHoEFqC/JwN+B8O xwnuN0cSkmoxCR3CSn/v24ScG1MRZ27HBy3SyE4DyX6y1aeYKPXRHsm36kGUwYWz ziHKzyPimoXZ2MtSOj1lpVyStO+uf0LSmNLuTIyIXJtsiMsBNmY4rxCExIUj1YCF fhq2Xw5nNEzJvvJls9/p8zymNFD/IC9VrTIxdL/JPsm+K165IAI= =jAA6 -----END PGP SIGNATURE-----
--c2dhp6q4lo2t2rp5--
--===============2787500768356188914== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|