Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-6417

Опубликовано: 01 окт. 2024
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2024-6417: flatpak security update (IMPORTANT)

[1.0.9-13.0.1]

  • Fix CVE-2024-42472 [Orabug: 37027734]

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

flatpak

1.0.9-13.0.1.el7_9

flatpak-builder

1.0.0-13.0.1.el7_9

flatpak-devel

1.0.9-13.0.1.el7_9

flatpak-libs

1.0.9-13.0.1.el7_9

Oracle Linux x86_64

flatpak

1.0.9-13.0.1.el7_9

flatpak-builder

1.0.0-13.0.1.el7_9

flatpak-devel

1.0.9-13.0.1.el7_9

flatpak-libs

1.0.9-13.0.1.el7_9

Связанные CVE

Связанные уязвимости

CVSS3: 10
ubuntu
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI...

CVSS3: 7.4
redhat
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...

CVSS3: 10
nvd
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`

CVSS3: 10
debian
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. ...

suse-cvrf
9 месяцев назад

Security update for bubblewrap and flatpak