|
Message-ID: <af227933-a69f-6a1f-5ab1-00a1031e8819@redhat.com> Date: Fri, 23 Jun 2017 07:37:54 +0200 From: Florian Weimer <fweimer@...hat.com> To: oss-security@...ts.openwall.com, Simon McVittie <smcv@...ian.org> Subject: Re: CVE-2017-9780: Flatpak: privilege escalation via setuid/world-writable file permissions On 06/22/2017 11:01 PM, Simon McVittie wrote: > * If you are using Flatpak to install apps from a third-party vendor, > then there is already a trust relationship: the app is sandboxed, but > the third-party vendor chooses what parameters are used for the sandbox. Doesn't this qualify as a vulnerability in its own right? Flatpak advertises countermeasures against malicious applications: “ Secure, sandboxed applications Flatpak's sandboxing technology prevents exploits and hinders malicious applications. ” But maybe it's like selling a VPN which isn't encrypted. Thanks, Florian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.