ALT-BU-2022-3782-1
Branch p10_e2k update bulletin.
Closed bugs
0.15.1
Closed vulnerabilities
BDU:2021-05776
Уязвимость компонента Modbus анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05777
Уязвимость службы Bluetooth SDP анализатора трафика компьютерных сетей Wireshark , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05801
Уязвимость службы Bluetooth DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05836
Уязвимость компонента C12.22 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05837
Уязвимость службы Bluetooth HCI_ISO анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05936
Уязвимость набора стандартов связи для коммуникации IEEE 802.11 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05943
Уязвимость диссектора IPPUSB анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00029
Уязвимость службы Bluetooth DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02437
Уязвимость диссектора RTMPT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02438
Уязвимость диссектора BitTorrent DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02439
Уязвимость диссектора Sysdig Event анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-39920
NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-15.html
- https://www.wireshark.org/security/wnpa-sec-2021-15.html
Modified: 2024-11-21
CVE-2021-39921
NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json
- https://gitlab.com/wireshark/wireshark/-/issues/17703
- https://gitlab.com/wireshark/wireshark/-/issues/17703
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-14.html
- https://www.wireshark.org/security/wnpa-sec-2021-14.html
Modified: 2024-11-21
CVE-2021-39922
Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json
- https://gitlab.com/wireshark/wireshark/-/issues/17636
- https://gitlab.com/wireshark/wireshark/-/issues/17636
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-12.html
- https://www.wireshark.org/security/wnpa-sec-2021-12.html
Modified: 2024-11-21
CVE-2021-39923
Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json
- https://gitlab.com/wireshark/wireshark/-/issues/17684
- https://gitlab.com/wireshark/wireshark/-/issues/17684
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-11.html
- https://www.wireshark.org/security/wnpa-sec-2021-11.html
Modified: 2024-11-21
CVE-2021-39924
Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json
- https://gitlab.com/wireshark/wireshark/-/issues/17677
- https://gitlab.com/wireshark/wireshark/-/issues/17677
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-10.html
- https://www.wireshark.org/security/wnpa-sec-2021-10.html
Modified: 2024-11-21
CVE-2021-39925
Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json
- https://gitlab.com/wireshark/wireshark/-/issues/17635
- https://gitlab.com/wireshark/wireshark/-/issues/17635
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-09.html
- https://www.wireshark.org/security/wnpa-sec-2021-09.html
Modified: 2024-11-21
CVE-2021-39926
Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json
- https://gitlab.com/wireshark/wireshark/-/issues/17649
- https://gitlab.com/wireshark/wireshark/-/issues/17649
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-08.html
- https://www.wireshark.org/security/wnpa-sec-2021-08.html
Modified: 2024-11-21
CVE-2021-39928
NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json
- https://gitlab.com/wireshark/wireshark/-/issues/17704
- https://gitlab.com/wireshark/wireshark/-/issues/17704
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-13.html
- https://www.wireshark.org/security/wnpa-sec-2021-13.html
Modified: 2024-11-21
CVE-2021-39929
Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json
- https://gitlab.com/wireshark/wireshark/-/issues/17651
- https://gitlab.com/wireshark/wireshark/-/issues/17651
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-07.html
- https://www.wireshark.org/security/wnpa-sec-2021-07.html
Modified: 2024-11-21
CVE-2021-4181
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
Modified: 2024-11-21
CVE-2021-4182
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
Modified: 2024-11-21
CVE-2021-4183
Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
Modified: 2024-11-21
CVE-2021-4184
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
Modified: 2024-11-21
CVE-2021-4185
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
Modified: 2024-11-21
CVE-2021-4186
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
Modified: 2024-11-21
CVE-2021-4190
Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
Package lxde-common updated to version 0.99.2-alt6 for branch p10_e2k.
Closed bugs
Настройки lxde сбрасываются до дефолтных при каждом логине пользователя.
Closed bugs
Не открывает и не пишет файлы
Package python3-module-django updated to version 3.2.11-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2022-00352
Уязвимость компонента UserAttributeSimilarityValidator фреймворка для веб-разработки Django, позволяющая нарушителю выполнить отказ в обслуживании
BDU:2022-00353
Уязвимость функция Storage.save() фреймворка для веб-приложений Django, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2022-00354
Уязвимость шаблона dictsort фреймворка для веб-приложений Django, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2021-45115
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
Modified: 2024-11-21
CVE-2021-45116
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
Modified: 2024-11-21
CVE-2021-45452
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://security.netapp.com/advisory/ntap-20220121-0005/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
- https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-43860
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Modified: 2024-11-21
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror-screenshots-url` is specified, then flatpak-builder will launch `flatpak build --nofilesystem=host appstream-utils mirror-screenshots` after finalization, which can lead to issues even with the `--nofilesystem=host` protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the `appstream-util` binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of `--nofilesystem=home` and `--nofilesystem=host`.
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-7e328bd66c
- FEDORA-2022-7e328bd66c
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049