oss-sec mailing list archives
Re: CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions
From: Florian Weimer <fweimer () redhat com>
Date: Fri, 23 Jun 2017 07:37:54 +0200
On 06/22/2017 11:01 PM, Simon McVittie wrote:
* If you are using Flatpak to install apps from a third-party vendor, then there is already a trust relationship: the app is sandboxed, but the third-party vendor chooses what parameters are used for the sandbox.
Doesn't this qualify as a vulnerability in its own right? Flatpak advertises countermeasures against malicious applications: “ Secure, sandboxed applications Flatpak's sandboxing technology prevents exploits and hinders malicious applications. ” But maybe it's like selling a VPN which isn't encrypted. Thanks, Florian
Current thread:
- CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions Simon McVittie (Jun 22)
- Re: CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions Florian Weimer (Jun 22)
- Re: CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions Simon McVittie (Jun 23)
- Re: CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions Florian Weimer (Jun 22)