CVE-2022-21682
NixOS vulnerability analysis and mitigation

Overview

Flatpak, a Linux application sandboxing and distribution framework, was found to contain a path traversal vulnerability (CVE-2022-21682) affecting versions prior to 1.12.3 and 1.10.6. The vulnerability exists in the flatpak-builder component when it applies finish-args last in the build process, allowing potential access to files outside the build directory (GitHub Advisory).

Technical details

The vulnerability occurs when flatpak-builder applies finish-args last in the build process. At this point, the build directory has full access specified in the manifest, so running flatpak build against it gains those permissions. The issue specifically manifests when --mirror-screenshots-url is specified, causing flatpak-builder to launch flatpak build --nofilesystem=host appstream-utils mirror-screenshots after finalization. This can lead to security issues even with the --nofilesystem=host protection, as it only overrides access to the full host while still allowing access to specific directories (GitHub Advisory).

Impact

The vulnerability allows a malicious application to potentially create empty directories wherever the user has write permissions. More critically, if an attacker can replace the appstream-util binary, they could perform more hostile actions. This could lead to unauthorized file system access and potential privilege escalation (GitHub Advisory, Debian Security).

Mitigation and workarounds

The vulnerability has been resolved in Flatpak versions 1.12.3 and 1.10.6 by changing the behavior of --nofilesystem=home and --nofilesystem=host. For flatpak-builder, version 1.2.2 includes the fix. Until patched versions can be installed, users are advised to avoid building apps from untrusted sources or to isolate flatpak-builder in a virtual machine or securely-configured container (GitHub Advisory, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61609HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management