Incorrect Authorization Affecting zincati package, versions >=0.0.24 <0.0.30


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-ZINCATI-9599697
  • published2 Apr 2025
  • disclosed16 Mar 2025
  • creditJonathan Lebon

Introduced: 16 Mar 2025

CVE-2025-27512  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade zincati to version 0.0.30 or higher.

Overview

zincati is an auto-update agent for Fedora CoreOS hosts

Affected versions of this package are vulnerable to Incorrect Authorization in a polkit rule, which grants org.projectatomic.rpmostree1.deploy and org.projectatomic.rpmostree1.finalize-deployment to all users and not only the system user as intended. A user with access to the system D-Bus socket may use this to perform a download attack on the target OS.

Workaround

This incorrect privilege assignment can be preempted by adding an earlier rule containing

polkit.addRule(function(action, subject) {
    if (action.id == "org.projectatomic.rpmostree1.deploy" ||
        action.id == "org.projectatomic.rpmostree1.finalize-deployment" ||
        action.id == "org.projectatomic.rpmostree1.cleanup") {
        if (subject.user != "zincati") {
                return polkit.Result.NO;
        }
    }
});

CVSS Base Scores

version 4.0
version 3.1