<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for flatpak</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0389-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-02-07T19:28:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-02-07T19:28:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-02-07T19:28:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for flatpak</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for flatpak to version 0.8.9 fixes security issues and bugs.

The following vulnerabilities were fixed:

- CVE-2018-6560: sandbox escape in the flatpak dbus proxy (boo#1078923)
- CVE-2017-9780: Malicious apps could have included inappropriate permissions (boo#1078989)
- old-style eavesdropping in the dbus proxy (boo#1078993)

This update also includes all upstream improvements and fixes in this stable release series.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00019.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0389-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flatpak-0.8.9-3.1">
      <FullProductName ProductID="flatpak-0.8.9-3.1">flatpak-0.8.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flatpak-builder-0.8.9-3.1">
      <FullProductName ProductID="flatpak-builder-0.8.9-3.1">flatpak-builder-0.8.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flatpak-devel-0.8.9-3.1">
      <FullProductName ProductID="flatpak-devel-0.8.9-3.1">flatpak-devel-0.8.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libflatpak0-0.8.9-3.1">
      <FullProductName ProductID="libflatpak0-0.8.9-3.1">libflatpak0-0.8.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Flatpak-1_0-0.8.9-3.1">
      <FullProductName ProductID="typelib-1_0-Flatpak-1_0-0.8.9-3.1">typelib-1_0-Flatpak-1_0-0.8.9-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flatpak-0.8.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:flatpak-0.8.9-3.1">flatpak-0.8.9-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="flatpak-builder-0.8.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:flatpak-builder-0.8.9-3.1">flatpak-builder-0.8.9-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="flatpak-devel-0.8.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:flatpak-devel-0.8.9-3.1">flatpak-devel-0.8.9-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libflatpak0-0.8.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libflatpak0-0.8.9-3.1">libflatpak0-0.8.9-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Flatpak-1_0-0.8.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:typelib-1_0-Flatpak-1_0-0.8.9-3.1">typelib-1_0-Flatpak-1_0-0.8.9-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Flatpak before 0.8.7, a third-party app repository could include malicious apps that contain files with inappropriate permissions, for example setuid or world-writable. The files are deployed with those permissions, which would let a local attacker run the setuid executable or write to the world-writable location. In the case of the "system helper" component, files deployed as part of the app are owned by root, so in the worst case they could be setuid root.</Note>
    </Notes>
    <CVE>CVE-2017-9780</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:flatpak-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:flatpak-builder-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:flatpak-devel-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libflatpak0-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:typelib-1_0-Flatpak-1_0-0.8.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9780.html</URL>
        <Description>CVE-2017-9780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012961</URL>
        <Description>SUSE Bug 1012961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078923</URL>
        <Description>SUSE Bug 1078923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078989</URL>
        <Description>SUSE Bug 1078989</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.</Note>
    </Notes>
    <CVE>CVE-2018-6560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:flatpak-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:flatpak-builder-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:flatpak-devel-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libflatpak0-0.8.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:typelib-1_0-Flatpak-1_0-0.8.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-02/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6560.html</URL>
        <Description>CVE-2018-6560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078923</URL>
        <Description>SUSE Bug 1078923</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
