File _patchinfo of Package patchinfo.14328
<patchinfo incident="14328"> <issue tracker="bnc" id="1155688">openh264 needs a later flatpak version</issue> <issue tracker="cve" id="2021-21381"/> <issue tracker="cve" id="2021-21261"/> <issue tracker="bnc" id="1183459">VUL-0: CVE-2021-21381: flatpak: the "file forwarding" feature can be used to gain unprivileged access to files</issue> <issue tracker="bnc" id="1180996">VUL-0: CVE-2021-21261: flatpak: sandbox escape via spawn portal</issue> <packager>alarrosa</packager> <rating>important</rating> <category>security</category> <summary>Security update for flatpak</summary> <description>This update for flatpak fixes the following issues: - CVE-2021-21381: Fixed an issue where a sandboxed application could read and write arbitrary host files via special tokens in the .desktop file (bsc#1183459). - CVE-2021-21261: Fixed a sandbox escape issue via the flatpak-portal service (bsc#1180996). Non-security fixes: - openh264 extension needs to use "extra_data". (bsc#1155688) The update will provide the support for extra_data" in extensions and will provide a list of versions that are supported. This will be useful for the extra_data for extensions because that will require it to say that it is supported for version > 1.2.5 in the 1.2 series and > 1.4.2 otherwise. The update will includes fixes for a segfault in the function that lists the installed references (flatpak_installation_list_installed_refs). When an appstream update is cancelled while downloading icons, the update will show a proper fail. Before this fix the next update attempt will see an up-to-date timestamp, think everyhing is ok and not download the missing icons. The update will introduce checks in the OCI (Open Container Initiative format) updates for validating if it is gpg verified. The update will install the required runtime for the installed extension. The update will prevent a crash if the "FlatpakDir" can't ensure it has a repo configured. The update will prevent the removal of local extensions considered remote and not locally related. </description> </patchinfo>