{"id":"CVE-2021-41133","details":"Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.","modified":"2026-04-10T04:38:13.139223Z","published":"2021-10-08T14:15:08.723Z","related":["ALEA-2021:4539","ALSA-2021:4042","GHSA-67h7-w3jq-vh4q","MGASA-2021-0486","SUSE-SU-2021:3472-1","SUSE-SU-2022:3284-1","SUSE-SU-2022:3439-1","openSUSE-SU-2021:1400-1","openSUSE-SU-2021:3472-1","openSUSE-SU-2024:11574-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5656ONDP2MGKIJMKEC7N2NXCV27WGTC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5DKCYRC6MFSTFCUP4DELCOUUP3SFEFX/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/10/26/9"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202312-12"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4984"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf"},{"type":"FIX","url":"https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/flatpak/flatpak","events":[{"introduced":"0"},{"fixed":"7ee022bfa5d06f5ea235a17add99cfeb9e82d8c8"},{"introduced":"649ad5fe49945b834da0d616a24400c41666048c"},{"fixed":"e4a41716d826cc7b11cba0da3452da096c8b4f9b"},{"introduced":"bcdc073041e0c93e15aa108b94cb7a39a79dcdf3"},{"fixed":"afb3575d3113a8491af25af3bbc7bcf1cb5b9b33"},{"fixed":"1330662f33a55e88bfe18e76de28b7922d91a999"},{"fixed":"26b12484eb8a6219b9e7aa287b298a894b2f34ca"},{"fixed":"462fca2c666e0cd2b60d6d2593a7216a83047aaf"},{"fixed":"4c34815784e9ffda5733225c7d95824f96375e36"},{"fixed":"89ae9fe74c6d445bb1b3a40e568d77cf5de47e48"},{"fixed":"9766ee05b1425db397d2cf23afd24c7f6146a69f"},{"fixed":"a10f52a7565c549612c92b8e736a6698a53db330"},{"fixed":"e26ac7586c392b5eb35ff4609fe232c52523b2cf"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.8.2"},{"introduced":"1.10.0"},{"fixed":"1.10.4"},{"introduced":"1.11.1"},{"fixed":"1.12.1"}]}}],"versions":["0.1","0.10.0","0.10.1","0.10.2","0.11.1","0.11.2","0.11.3","0.11.4","0.11.5","0.11.6","0.11.7","0.11.8","0.11.8.1","0.11.8.2","0.11.8.3","0.2","0.2.1","0.3","0.3.1","0.3.2","0.3.3","0.3.4","0.3.5","0.3.6","0.4.0","0.4.1","0.4.10","0.4.11","0.4.12","0.4.13","0.4.2","0.4.2.1","0.4.3","0.4.4","0.4.5","0.4.6","0.4.7","0.4.8","0.4.9","0.5.0","0.5.1","0.5.2","0.6.0","0.6.1","0.6.10","0.6.11","0.6.12","0.6.13","0.6.14","0.6.2","0.6.3","0.6.4","0.6.5","0.6.6","0.6.7","0.6.8","0.6.9","0.8.0","0.8.1","0.9.1","0.9.10","0.9.11","0.9.12","0.9.2","0.9.3","0.9.4","0.9.5","0.9.6","0.9.7","0.9.8","0.9.9","0.9.98","0.9.98.1","0.9.98.2","0.9.99","0.99.1","0.99.2","0.99.3","1.0.0","1.0.1","1.0.2","1.0.3","1.1.0","1.1.1","1.1.2","1.1.3","1.10.0","1.10.1","1.10.2","1.10.3","1.11.1","1.11.2","1.11.3","1.12.0","1.2.0","1.2.1","1.3.0","1.3.1","1.3.2","1.3.3","1.3.4","1.4.0","1.5.0","1.5.1","1.5.2","1.6.0","1.6.1","1.6.2","1.7.1","1.7.2","1.7.3","1.8.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41133.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}