← Voltar para CVEs
CVE-2018-6560
N/ADescricao
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado2/2/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
flatpak:flatpakredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Fraquezas (CWE)
CWE-436
Referencias
https://access.redhat.com/errata/RHSA-2018:2766(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(cve@mitre.org)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2018:2766(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.10.3(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/flatpak/flatpak/releases/tag/0.8.9(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.