← Back to CVEs
CVE-2018-6560
N/ADescription
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
CVE Details
CVSS v3.1 ScoreN/A
Published2/2/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
flatpak:flatpakredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Weaknesses (CWE)
CWE-436
References
https://access.redhat.com/errata/RHSA-2018:2766(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2018:2766(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.