Package: flatpak-builder
Version: 1.4.5-1
Severity: important
Tags: upstream
Forwarded: 
https://github.com/flatpak/flatpak-builder/security/advisories/GHSA-6gm9-3g7m-3965
X-Debbugs-Cc: Debian Security Team <[email protected]>

If flatpak-builder is used to build a Flatpak app from a malicious 
manifest or source code, a path traversal vulnerability in versions 
1.4.5+ can be used to copy sensitive/secret files from the host system 
into the app.

Luckily trixie and older are not believed to have the vulnerable 
feature (trixie has flatpak-builder 1.4.4).

A mitigation is that if you only build Flatpak apps that you trust (the 
most likely use case) there is no problem, so I've reported this as 
non-RC (but please escalate to RC if the security team disagrees). 
This is mainly a problem for centralized services like Flathub that want 
to build untrusted or only-semi-trusted Flatpak apps from source.

    smcv

_______________________________________________
Pkg-utopia-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-utopia-maintainers

Reply via email to