Описание
Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk
This update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk fixes the following issues:
libostree:
Update to version 2020.8
-
Enable LTO. (bsc#1133120)
-
This update contains scalability improvements and bugfixes.
-
Caching-related HTTP headers are now supported on summaries and signatures, so that they do not have to be re-downloaded if not changed in the meanwhile.
-
Summaries and delta have been reworked to allow more fine-grained fetching.
-
Fixes several bugs related to atomic variables, HTTP timeouts, and 32-bit architectures.
-
Static deltas can now be signed to more easily support offline verification.
-
There's now support for multiple initramfs images; Is it possible to have a 'main' initramfs image and a secondary one which represents local configuration.
-
The documentation is now moved to https://ostreedev.github.io/ostree/
-
Fix for an assertion failure when upgrading from systems before ostree supported devicetree.
-
ostree no longer hardlinks zero sized files to avoid hitting filesystem maximum link counts.
-
ostree now supports
/and/bootbeing on the same filesystem. -
Improvements to the GObject Introspection metadata, some (cosmetic) static analyzer fixes, a fix for the immutable bit on s390x, dropping a deprecated bit in the systemd unit file.
-
Fix a regression 2020.4 where the 'readonly sysroot' changes incorrectly left the sysroot read-only on systems that started out with a read-only
/(most of them, e.g. Fedora Silverblue/IoT at least). -
The default dracut config now enables reproducibility.
-
There is a new ostree admin unlock
--transient. This should to be a foundation for further support for 'live' updates. -
New
ed25519signing support, powered bylibsodium. -
stree commit gained a new
--baseargument, which significantly simplifies constructing 'derived' commits, particularly for systems using SELinux. -
Handling of the read-only sysroot was reimplemented to run in the initramfs and be more reliable. Enabling the
readonly=trueflag in the repo config is recommended. -
Several fixes in locking for the temporary 'staging' directories OSTree creates, particularly on NFS.
-
A new
timestamp-check-from-revoption was added for pulls, which makes downgrade protection more reliable and will be used by Fedora CoreOS. -
Several fixes and enhancements made for 'collection' pulls including a new
--mirroroption. -
The ostree commit command learned a new
--mode-ro-executableswhich enforcesW^Rsemantics on all executables. -
Added a new commit metadata key
OSTREE_COMMIT_META_KEY_ARCHITECTUREto help standardize the architecture of the OSTree commit. This could be used on the client side for example to sanity-check that the commit matches the architecture of the machine before deploying. -
Stop invalid usage of
%_libexecdir:- Use
%{_prefix}/libwhere appropriate. - Use
_systemdgeneratordirfor the systemd-generators. - Define
_dracutmodulesdirbased ondracut.pc. Add BuildRequires(dracut) for this to work.
- Use
xdg-desktop-portal:
Update to version 1.8.0:
- Ensure systemd rpm macros are called at install/uninstall times for systemd user services.
- Add BuildRequires on systemd-rpm-macros.
- openuri:
- Allow skipping the chooser for more URL tyles
- Robustness fixes
- filechooser:
- Return the current filter
- Add a 'directory' option
- Document the 'writable' option
- camera:
- Make the client node visible
- Don't leak pipewire proxy
- Fix file descriptor leaks
- Testsuite improvements
- Updated translations.
- document:
- Reduce the use of open fds
- Add more tests and fix issues they found
- Expose directories with their proper name
- Support exporting directories
- New fuse implementation
- background: Avoid a segfault
- screencast: Require pipewire 0.3
- Better support for snap and toolbox
- Require
/usr/bin/fusermount:xdg-document-portalcalls out to the binary. (bsc#1175899) Without it, files or dirs can be selected, but whatever is done with or in them, will not have any effect - Fixes for
%_libexecdirchanging to/usr/libexec
xdg-desktop-portal-gtk:
Update to version 1.8.0:
- filechooser:
- Return the current filter
- Handle the 'directory' option to select directories
- Only show preview when we have an image
- Return the current filter
- screenshot: Fix cancellation
- appchooser: Avoid a crash
- wallpaper:
- Properly preview placement settings
- Drop the lockscreen option
- printing: Improve the notification
- Updated translations.
- settings: Fall back to gsettings for enable-animations
- screencast: Support Mutter version to 3 (New pipewire api ver 3).
flatpak:
-
Update to version 1.10.2 (jsc#SLE-17238, ECO-3148)
-
This is a security update which fixes a potential attack where a flatpak application could use custom formated
.desktopfile to gain access to files on the host system. -
Fix memory leaks
-
Documentation and translations updates
-
Spawn portal better handles non-utf8 filenames
-
Fix flatpak build on systems with setuid bwrap
-
Fix crash on updating apps with no deploy data
-
Remove deprecated texinfo packaging macros.
-
Support for the new repo format which should make updates faster and download less data.
-
The systemd generator snippets now call flatpak
--print-updated-envin place of a bunch of shell for better login performance. -
The
.profilesnippets now disable GVfs when calling flatpak to avoid spawning a gvfs daemon when logging in via ssh. -
Flatpak now finds the pulseaudio sockets better in uncommon configurations.
-
Sandboxes with network access it now also has access to the
systemd-resolvedsocket to do dns lookups. -
Flatpak supports unsetting environment variables in the sandbox using
--unset-env, and--env=FOO=now sets FOO to the empty string instead of unsetting it. -
The spawn portal now has an option to share the pid namespace with the sub-sandbox.
-
This security update fixes a sandbox escape where a malicious application can execute code outside the sandbox by controlling the environment of the 'flatpak run' command when spawning a sub-sandbox (bsc#1180996, CVE-2021-21261)
-
Fix support for ppc64.
-
Move flatpak-bisect and flatpak-coredumpctl to devel subpackage, allow to remove python3 dependency on main package.
-
Enable LTO as gobject-introspection works fine with LTO. (bsc#1133124)
-
Fixed progress reporting for OCI and extra-data.
-
The in-memory summary cache is more efficient.
-
Fixed authentication getting stuck in a loop in some cases.
-
Fixed authentication error reporting.
-
Extract OCI info for runtimes as well as apps.
-
Fixed crash if anonymous authentication fails and
-yis specified. -
flatpak info now only looks at the specified installation if one is specified.
-
Better error reporting for server HTTP errors during download.
-
Uninstall now removes applications before the runtime it depends on.
-
Avoid updating metadata from the remote when uninstalling.
-
FlatpakTransaction now verifies all passed in refs to avoid.
-
Added validation of collection id settings for remotes.
-
Fix seccomp filters on s390.
-
Robustness fixes to the spawn portal.
-
Fix support for masking update in the system installation.
-
Better support for distros with uncommon models of merged
/usr. -
Cache responses from localed/AccountService.
-
Fix hangs in cases where
xdg-dbus-proxyfails to start. -
Fix double-free in cups socket detection.
-
OCI authenticator now doesn't ask for auth in case of http errors.
-
Fix invalid usage of
%{_libexecdir}to reference systemd directories. -
Fixes for
%_libexecdirchanging to/usr/libexec -
Avoid calling authenticator in update if ref didn't change
-
Don't fail transaction if ref is already installed (after transaction start)
-
Fix flatpak run handling of userns in the
--device=allcase -
Fix handling of extensions from different remotes
-
Fix flatpak run
--no-session-bus -
FlatpakTransactionhas a new signalinstall-authenticatorwhich clients can handle to install authenticators needed for the transaction. This is done in the CLI commands. -
Now the host timezone data is always exposed, fixing several apps that had timezone issues.
-
There's a new systemd unit (not installed by default) to automatically detect plugged in usb sticks with sideload repos.
-
By default the
gdm env.dfile is no longer installed because the systemd generators work better. -
create-usbnow exports partial commits by default -
Fix handling of docker media types in oci remotes
-
Fix subjects in
remote-info --logoutput -
This release is also able to host flatpak images on e.g. docker hub.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Список пакетов
openSUSE Leap 15.2
Ссылки
- E-Mail link for openSUSE-SU-2021:0520-1
- SUSE Security Ratings
- SUSE Bug 1133120
- SUSE Bug 1133124
- SUSE Bug 1175899
- SUSE Bug 1180996
- SUSE CVE CVE-2021-21261 page
Описание
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
Затронутые продукты
Ссылки
- CVE-2021-21261
- SUSE Bug 1180996