Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-39977

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
flatpak-builderfixed1.4.8-1package
flatpak-buildernot-affectedtrixiepackage
flatpak-buildernot-affectedbookwormpackage
flatpak-buildernot-affectedbullseyepackage

Примечания

  • https://github.com/flatpak/flatpak-builder/security/advisories/GHSA-6gm9-3g7m-3965

EPSS

Процентиль: 14%
0.00046
Низкий

Связанные уязвимости

ubuntu
5 дней назад

flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8.

CVSS3: 5.5
redhat
6 дней назад

A flaw was found in flatpak-builder. A specially crafted manifest or source can bypass path restrictions by using symbolic links within the `license-files` field, allowing the builder to follow paths outside the intended source directory, reading arbitrary files from the host system and including them in the build output. As a result, sensitive data from the host environment may be exposed in the resulting application package.

nvd
6 дней назад

flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8.

EPSS

Процентиль: 14%
0.00046
Низкий