← Zuruck zu CVEs
CVE-2018-6560
N/ABeschreibung
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht2/2/2018
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
flatpak:flatpakredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Schwachen (CWE)
CWE-436
Referenzen
https://access.redhat.com/errata/RHSA-2018:2766(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2018:2766(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.