Access Restriction Bypass Affecting flatpak/flatpak package, versions [,0.8.7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FLATPAKFLATPAK-2364936
  • published26 Jan 2022
  • disclosed21 Jun 2017
  • creditUnknown

Introduced: 21 Jun 2017

CVE-2017-9780  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade flatpak/flatpak to version 0.8.7 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. In Flatpak before 0.8.7, a third-party app repository could include malicious apps that contain files with inappropriate permissions, for example setuid or world-writable. The files are deployed with those permissions, which would let a local attacker run the setuid executable or write to the world-writable location. In the case of the "system helper" component, files deployed as part of the app are owned by root, so in the worst case they could be setuid root.

References

CVSS Scores

version 3.1