{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk","title":"Title of the patch"},{"category":"description","text":"This update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk fixes the following issues:\n\nlibostree:\n\nUpdate to version 2020.8\n\n- Enable LTO. (bsc#1133120)\n\n- This update contains scalability improvements and bugfixes.\n- Caching-related HTTP headers are now supported on summaries and signatures, so that they do not have to be \n  re-downloaded if not changed in the meanwhile.\n- Summaries and delta have been reworked to allow more fine-grained fetching.\n- Fixes several bugs related to atomic variables, HTTP timeouts, and 32-bit architectures.\n- Static deltas can now be signed to more easily support offline verification.\n- There's now support for multiple initramfs images; Is it possible to have a 'main' initramfs image and a \n  secondary one which represents local configuration.\n- The documentation is now moved to https://ostreedev.github.io/ostree/\n- Fix for an assertion failure when upgrading from systems before ostree supported devicetree.\n- ostree no longer hardlinks zero sized files to avoid hitting filesystem maximum link counts.\n- ostree now supports `/` and `/boot` being on the same filesystem.\n- Improvements to the GObject Introspection metadata, some (cosmetic) static analyzer fixes, a fix for \n  the immutable bit on s390x, dropping a deprecated bit in the systemd unit file.\n- Fix a regression 2020.4 where the 'readonly sysroot' changes incorrectly left the sysroot read-only \n  on systems that started out with a read-only `/` (most of them, e.g. Fedora Silverblue/IoT at least).\n- The default dracut config now enables reproducibility.\n- There is a new ostree admin unlock `--transient`. This should to be a foundation for further support \n  for 'live' updates.\n- New `ed25519` signing support, powered by `libsodium`.\n- stree commit gained a new `--base` argument, which significantly simplifies constructing 'derived' \n  commits, particularly for systems using SELinux.\n- Handling of the read-only sysroot was reimplemented to run in the initramfs and be more reliable. \n  Enabling the `readonly=true` flag in the repo config is recommended.\n- Several fixes in locking for the temporary 'staging' directories OSTree creates, particularly on NFS.\n- A new `timestamp-check-from-rev` option was added for pulls, which makes downgrade protection more \n  reliable and will be used by Fedora CoreOS.\n- Several fixes and enhancements made for 'collection' pulls including a new `--mirror` option.\n- The ostree commit command learned a new `--mode-ro-executables` which enforces `W^R` semantics \n  on all executables.\n- Added a new  commit metadata key `OSTREE_COMMIT_META_KEY_ARCHITECTURE` to help standardize \n  the architecture of the OSTree commit. This could be used on the client side for example to \n  sanity-check that the commit matches the architecture of the machine before deploying.\n- Stop invalid usage of `%_libexecdir`:\n  + Use `%{_prefix}/lib` where appropriate.\n  + Use `_systemdgeneratordir` for the systemd-generators.\n  + Define `_dracutmodulesdir` based on `dracut.pc`. Add BuildRequires(dracut) for this to work.\n\nxdg-desktop-portal:\n\nUpdate to version 1.8.0:\n\n- Ensure systemd rpm macros are called at install/uninstall times for systemd user services.\n- Add BuildRequires on systemd-rpm-macros.\n- openuri:\n  - Allow skipping the chooser for more URL tyles\n  - Robustness fixes\n- filechooser: \n  - Return the current filter\n  - Add a 'directory' option\n  - Document the 'writable' option\n- camera:\n  - Make the client node visible\n  - Don't leak pipewire proxy\n- Fix file descriptor leaks\n- Testsuite improvements\n- Updated translations.\n- document:\n  - Reduce the use of open fds\n  - Add more tests and fix issues they found\n  - Expose directories with their proper name\n  - Support exporting directories\n  - New fuse implementation\n- background: Avoid a segfault\n- screencast: Require pipewire 0.3\n- Better support for snap and toolbox\n- Require `/usr/bin/fusermount`: `xdg-document-portal` calls out to the binary. (bsc#1175899)\n  Without it, files or dirs can be selected, but whatever is done with or in them, will not have any effect\n- Fixes for `%_libexecdir` changing to `/usr/libexec`\n\nxdg-desktop-portal-gtk:\n\nUpdate to version 1.8.0:\n\n- filechooser: \n  - Return the current filter\n    - Handle the 'directory' option to select directories\n    - Only show preview when we have an image\n- screenshot: Fix cancellation\n- appchooser: Avoid a crash\n- wallpaper:\n  - Properly preview placement settings\n  - Drop the lockscreen option\n- printing: Improve the notification\n- Updated translations.\n- settings: Fall back to gsettings for enable-animations\n- screencast: Support Mutter version to 3 (New pipewire api ver 3).\n\nflatpak:\n\n-  Update to version 1.10.2 (jsc#SLE-17238, ECO-3148)\n\n-  This is a security update which fixes a potential attack where a flatpak application could use custom formated \n   `.desktop` file to gain access to files on the host system.\n- Fix memory leaks\n- Documentation and translations updates\n- Spawn portal better handles non-utf8 filenames\n- Fix flatpak build on systems with setuid bwrap \n- Fix crash on updating apps with no deploy data\n- Remove deprecated texinfo packaging macros.\n- Support for the new repo format which should make updates faster and download less data.\n- The systemd generator snippets now call flatpak `--print-updated-env` in place of a bunch of shell for better\n  login performance.\n- The `.profile` snippets now disable GVfs when calling flatpak to avoid spawning a gvfs daemon when logging in via ssh.\n- Flatpak now finds the pulseaudio sockets better in uncommon configurations.\n- Sandboxes with network access it now also has access to the `systemd-resolved` socket to do dns lookups.\n- Flatpak supports unsetting environment variables in the sandbox using `--unset-env`, \n  and `--env=FOO=` now sets FOO to the empty string instead of unsetting it.\n- The spawn portal now has an option to share the pid namespace with the sub-sandbox.\n- This security update fixes a sandbox escape where a malicious application can execute code outside the sandbox by \n  controlling the environment of the 'flatpak run' command when spawning a sub-sandbox (bsc#1180996, CVE-2021-21261)\n- Fix support for ppc64.\n- Move flatpak-bisect and flatpak-coredumpctl to devel subpackage, allow to remove python3 dependency on main package.\n- Enable LTO as gobject-introspection works fine with LTO. (bsc#1133124)\n- Fixed progress reporting for OCI and extra-data.\n- The in-memory summary cache is more efficient.\n- Fixed authentication getting stuck in a loop in some cases.\n- Fixed authentication error reporting.\n- Extract OCI info for runtimes as well as apps. \n- Fixed crash if anonymous authentication fails and `-y` is specified.\n- flatpak info now only looks at the specified installation if one is specified.\n- Better error reporting for server HTTP errors during download. \n- Uninstall now removes applications before the runtime it depends on.\n- Avoid updating metadata from the remote when uninstalling.\n- FlatpakTransaction now verifies all passed in refs to avoid.\n- Added validation of collection id settings for remotes.\n- Fix seccomp filters on s390.\n- Robustness fixes to the spawn portal.\n- Fix support for masking update in the system installation.\n- Better support for distros with uncommon models of merged `/usr`.\n- Cache responses from localed/AccountService.\n- Fix hangs in cases where `xdg-dbus-proxy` fails to start.\n- Fix double-free in cups socket detection.\n- OCI authenticator now doesn't ask for auth in case of http errors.\n- Fix invalid usage of `%{_libexecdir}` to reference systemd directories.\n- Fixes for `%_libexecdir` changing to `/usr/libexec`\n- Avoid calling authenticator in update if ref didn't change\n- Don't fail transaction if ref is already installed (after transaction start)\n- Fix flatpak run handling of userns in the `--device=all` case\n- Fix handling of extensions from different remotes\n- Fix flatpak run `--no-session-bus`\n- `FlatpakTransaction` has a new signal `install-authenticator` which clients can handle to install authenticators \n   needed for the transaction. This is done in the CLI commands.\n- Now the host timezone data is always exposed, fixing several apps that had timezone issues.\n- There's a new  systemd unit (not installed by default) to automatically detect plugged in usb sticks with \n  sideload repos.\n- By default the `gdm env.d` file is no longer installed because the  systemd generators work better.\n- `create-usb` now exports partial commits by default \n- Fix handling of docker media types in oci remotes\n- Fix subjects in `remote-info --log` output\n- This release is also able to host flatpak images on e.g. docker hub.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.","title":"Description of the patch"},{"category":"details","text":"openSUSE-2021-520","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0520-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2021:0520-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JRX7C3J3TJQXJODJCARSGDYY4AM57Q7/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2021:0520-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JRX7C3J3TJQXJODJCARSGDYY4AM57Q7/"},{"category":"self","summary":"SUSE Bug 1133120","url":"https://bugzilla.suse.com/1133120"},{"category":"self","summary":"SUSE Bug 1133124","url":"https://bugzilla.suse.com/1133124"},{"category":"self","summary":"SUSE Bug 1175899","url":"https://bugzilla.suse.com/1175899"},{"category":"self","summary":"SUSE Bug 1180996","url":"https://bugzilla.suse.com/1180996"},{"category":"self","summary":"SUSE CVE CVE-2021-21261 page","url":"https://www.suse.com/security/cve/CVE-2021-21261/"}],"title":"Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk","tracking":{"current_release_date":"2021-04-08T22:41:52Z","generator":{"date":"2021-04-08T22:41:52Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2021:0520-1","initial_release_date":"2021-04-08T22:41:52Z","revision_history":[{"date":"2021-04-08T22:41:52Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libostree-2020.8-lp152.2.3.1.i586","product":{"name":"libostree-2020.8-lp152.2.3.1.i586","product_id":"libostree-2020.8-lp152.2.3.1.i586"}},{"category":"product_version","name":"libostree-1-1-2020.8-lp152.2.3.1.i586","product":{"name":"libostree-1-1-2020.8-lp152.2.3.1.i586","product_id":"libostree-1-1-2020.8-lp152.2.3.1.i586"}},{"category":"product_version","name":"libostree-devel-2020.8-lp152.2.3.1.i586","product":{"name":"libostree-devel-2020.8-lp152.2.3.1.i586","product_id":"libostree-devel-2020.8-lp152.2.3.1.i586"}},{"category":"product_version","name":"libostree-grub2-2020.8-lp152.2.3.1.i586","product":{"name":"libostree-grub2-2020.8-lp152.2.3.1.i586","product_id":"libostree-grub2-2020.8-lp152.2.3.1.i586"}},{"category":"product_version","name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","product":{"name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","product_id":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","product":{"name":"xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","product_id":"xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch"}},{"category":"product_version","name":"xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch","product":{"name":"xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch","product_id":"xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"flatpak-1.10.2-lp152.3.6.1.x86_64","product":{"name":"flatpak-1.10.2-lp152.3.6.1.x86_64","product_id":"flatpak-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"flatpak-devel-1.10.2-lp152.3.6.1.x86_64","product":{"name":"flatpak-devel-1.10.2-lp152.3.6.1.x86_64","product_id":"flatpak-devel-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","product":{"name":"flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","product_id":"flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"libflatpak0-1.10.2-lp152.3.6.1.x86_64","product":{"name":"libflatpak0-1.10.2-lp152.3.6.1.x86_64","product_id":"libflatpak0-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"libostree-2020.8-lp152.2.3.1.x86_64","product":{"name":"libostree-2020.8-lp152.2.3.1.x86_64","product_id":"libostree-2020.8-lp152.2.3.1.x86_64"}},{"category":"product_version","name":"libostree-1-1-2020.8-lp152.2.3.1.x86_64","product":{"name":"libostree-1-1-2020.8-lp152.2.3.1.x86_64","product_id":"libostree-1-1-2020.8-lp152.2.3.1.x86_64"}},{"category":"product_version","name":"libostree-devel-2020.8-lp152.2.3.1.x86_64","product":{"name":"libostree-devel-2020.8-lp152.2.3.1.x86_64","product_id":"libostree-devel-2020.8-lp152.2.3.1.x86_64"}},{"category":"product_version","name":"libostree-grub2-2020.8-lp152.2.3.1.x86_64","product":{"name":"libostree-grub2-2020.8-lp152.2.3.1.x86_64","product_id":"libostree-grub2-2020.8-lp152.2.3.1.x86_64"}},{"category":"product_version","name":"system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","product":{"name":"system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","product_id":"system-user-flatpak-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","product":{"name":"typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","product_id":"typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64"}},{"category":"product_version","name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","product":{"name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","product_id":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64"}},{"category":"product_version","name":"xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","product":{"name":"xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","product_id":"xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64"}},{"category":"product_version","name":"xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","product":{"name":"xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","product_id":"xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64"}},{"category":"product_version","name":"xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","product":{"name":"xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","product_id":"xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Leap 15.2","product":{"name":"openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"flatpak-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:flatpak-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"flatpak-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"flatpak-devel-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:flatpak-devel-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"flatpak-devel-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libflatpak0-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libflatpak0-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"libflatpak0-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-2020.8-lp152.2.3.1.i586 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.i586"},"product_reference":"libostree-2020.8-lp152.2.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-2020.8-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.x86_64"},"product_reference":"libostree-2020.8-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-1-1-2020.8-lp152.2.3.1.i586 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.i586"},"product_reference":"libostree-1-1-2020.8-lp152.2.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-1-1-2020.8-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.x86_64"},"product_reference":"libostree-1-1-2020.8-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-devel-2020.8-lp152.2.3.1.i586 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.i586"},"product_reference":"libostree-devel-2020.8-lp152.2.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-devel-2020.8-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.x86_64"},"product_reference":"libostree-devel-2020.8-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-grub2-2020.8-lp152.2.3.1.i586 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.i586"},"product_reference":"libostree-grub2-2020.8-lp152.2.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"libostree-grub2-2020.8-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.x86_64"},"product_reference":"libostree-grub2-2020.8-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"system-user-flatpak-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:system-user-flatpak-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64"},"product_reference":"typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586"},"product_reference":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64"},"product_reference":"typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64"},"product_reference":"xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64"},"product_reference":"xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64"},"product_reference":"xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch"},"product_reference":"xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","relates_to_product_reference":"openSUSE Leap 15.2"},{"category":"default_component_of","full_product_name":{"name":"xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch"},"product_reference":"xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch","relates_to_product_reference":"openSUSE Leap 15.2"}]},"vulnerabilities":[{"cve":"CVE-2021-21261","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-21261"}],"notes":[{"category":"general","text":"Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.2:flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-devel-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libflatpak0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","openSUSE Leap 15.2:xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2021-21261","url":"https://www.suse.com/security/cve/CVE-2021-21261"},{"category":"external","summary":"SUSE Bug 1180996 for CVE-2021-21261","url":"https://bugzilla.suse.com/1180996"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.2:flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-devel-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libflatpak0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","openSUSE Leap 15.2:xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 15.2:flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-devel-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:flatpak-zsh-completion-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libflatpak0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-1-1-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-devel-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:libostree-grub2-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:system-user-flatpak-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-Flatpak-1_0-1.10.2-lp152.3.6.1.x86_64","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.i586","openSUSE Leap 15.2:typelib-1_0-OSTree-1_0-2020.8-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-devel-1.8.0-lp152.4.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-1.8.0-lp152.2.3.1.x86_64","openSUSE Leap 15.2:xdg-desktop-portal-gtk-lang-1.8.0-lp152.2.3.1.noarch","openSUSE Leap 15.2:xdg-desktop-portal-lang-1.8.0-lp152.4.3.1.noarch"]}],"threats":[{"category":"impact","date":"2021-04-08T22:41:52Z","details":"important"}],"title":"CVE-2021-21261"}]}