CVE-2018-6560
EUVD-2018-1831102.02.2018, 14:29
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| flatpak | flatpak | 𝑥 < 0.8.9 |
| flatpak | flatpak | 0.9.1 ≤ 𝑥 ≤ 0.9.99 |
| flatpak | flatpak | 0.10.0 ≤ 𝑥 < 0.10.3 |
| redhat | enterprise_linux_desktop | 7.0 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_server_aus | 7.6 |
| redhat | enterprise_linux_server_eus | 7.5 |
| redhat | enterprise_linux_server_eus | 7.6 |
| redhat | enterprise_linux_server_tus | 7.6 |
| redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References