flatpak 1.0.6 release.
This release fixes an issue that lets system-wide installed applications create setuid root files inside their app dir (somewhere in /var/lib/flatpak/app). Setuid support is disabled inside flatpaks, so such files are only a risk if the user runs them manually outside flatpak.
Installing a flatpak system-wide is needs root access, so this isn't a privilege elevation for non-root users, and allowing root to install setuid files is something all traditional packaging systems allow. However flatpak tries to be better than that, in order to make it easier to trust third party repositories.
Changes in this version:
flatpak 1.0.5 release.
There was a sandbox bug in the previous version where parts of the runtime /etc was not mounted read-only. In case the runtime was installed as the user (not the default) this means that the app could modify files on the runtime. Nothing in the host uses the runtime files, so this is not a direct sandbox escape, but it is possible that an app can confuse a different app that has higher permissions and so gain privileges.
Detailed changes:
In addition to upstream changes, this update also fixes a packaging issue and adds a missing dependency on p11-kit-server to fix accessing host TLS certificates.
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2018-9b7d7a155b
Please login to add feedback.
This update has been submitted for testing by kalev.
This update has obsoleted flatpak-1.0.5-2.fc27, and has inherited its bugs and notes.
This update has been pushed to testing.
eupoo8Ko2..R
Oops. Changed my password now.
kalev edited this update.
This update has been submitted for batched by kalev.
This update has been submitted for stable by bodhi.
This update has been pushed to stable.