A sandbox escape vulnerability was found in Flatpak due to a symlink-following issue when mounting persistent directories. This flaw allows a local user or attacker to craft a symbolic link that can bypass the intended restrictions, enabling access to and modification of files outside the designated sandbox. As a result, the attacker could potentially manipulate the file system, leading to unauthorized actions that compromise the security and integrity of the system.
Flatpak is not providing a security boundary that protects the OS from untrusted content in the flatpak. Flatpak applications should be vetted and reviewed with the same attention as regular OS packages. It should be assumed that an installed flatpak shares the same privileges and access than the user running it.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2023 | bubblewrap | 2024-10-10 03:02 | ALAS2023-2024-726 |
Amazon Linux 2 - Core | flatpak | 2024-12-05 01:02 | ALAS2-2024-2712 |
Amazon Linux 2023 | flatpak | 2024-10-24 22:53 | ALAS2023-2024-745 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
NVD | CVSSv3 | 10.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |