Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-6422

Опубликовано: 05 сент. 2024
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT)

bubblewrap [0.4.0-2]

  • Backport upstream fix to help address CVE-2024-42472 in flatpak

flatpak [1.12.9-3]

  • Fix previous changelog entry

[1.12.9-2]

  • Backport upstream patches for CVE-2024-42472
  • Require bubblewrap version that has new --bind-fd option backported for addressing CVE-2024-42472

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bubblewrap

0.4.0-2.el8_10

flatpak

1.12.9-3.el8_10

flatpak-devel

1.12.9-3.el8_10

flatpak-libs

1.12.9-3.el8_10

flatpak-selinux

1.12.9-3.el8_10

flatpak-session-helper

1.12.9-3.el8_10

Oracle Linux x86_64

bubblewrap

0.4.0-2.el8_10

flatpak

1.12.9-3.el8_10

flatpak-devel

1.12.9-3.el8_10

flatpak-libs

1.12.9-3.el8_10

flatpak-selinux

1.12.9-3.el8_10

flatpak-session-helper

1.12.9-3.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 10
ubuntu
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI...

CVSS3: 7.4
redhat
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...

CVSS3: 10
nvd
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`

CVSS3: 10
debian
10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. ...

suse-cvrf
9 месяцев назад

Security update for bubblewrap and flatpak