Количество 21
Количество 21

BDU:2024-03113
Уязвимость интерфейса xdg-desktop-portal инструмента для управления приложениями и средами Flatpak, позволяющая нарушителю выйти из изолированной программной среды и получить доступ к файлам в базовой системе

ROS-20240507-06
Уязвимость flatpak

CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak req...

CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak req...

CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak requir
CVE-2024-32462
Flatpak is a system for building, distributing, and running sandboxed ...

SUSE-SU-2024:2067-1
Security update for xdg-desktop-portal

SUSE-SU-2024:1832-1
Security update for xdg-desktop-portal

SUSE-SU-2024:1831-1
Security update for xdg-desktop-portal

SUSE-SU-2024:1806-1
Security update for xdg-desktop-portal

SUSE-SU-2024:1803-1
Security update for xdg-desktop-portal

SUSE-SU-2024:1548-1
Security update for flatpak

SUSE-SU-2024:1547-1
Security update for flatpak

SUSE-SU-2024:1536-1
Security update for flatpak

SUSE-SU-2024:1535-1
Security update for flatpak

RLSA-2024:3961
Important: flatpak security update

RLSA-2024:3959
Important: flatpak security update
ELSA-2024-3980
ELSA-2024-3980: flatpak security update (IMPORTANT)
ELSA-2024-3961
ELSA-2024-3961: flatpak security update (IMPORTANT)
ELSA-2024-3959
ELSA-2024-3959: flatpak security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-03113 Уязвимость интерфейса xdg-desktop-portal инструмента для управления приложениями и средами Flatpak, позволяющая нарушителю выйти из изолированной программной среды и получить доступ к файлам в базовой системе | CVSS3: 8.4 | 0% Низкий | около 1 года назад |
![]() | ROS-20240507-06 Уязвимость flatpak | CVSS3: 8.4 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-32462 Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak req... | CVSS3: 8.4 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-32462 Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak req... | CVSS3: 8.4 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-32462 Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak requir | CVSS3: 8.4 | 0% Низкий | около 1 года назад |
CVE-2024-32462 Flatpak is a system for building, distributing, and running sandboxed ... | CVSS3: 8.4 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2067-1 Security update for xdg-desktop-portal | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1832-1 Security update for xdg-desktop-portal | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1831-1 Security update for xdg-desktop-portal | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1806-1 Security update for xdg-desktop-portal | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1803-1 Security update for xdg-desktop-portal | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1548-1 Security update for flatpak | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1547-1 Security update for flatpak | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1536-1 Security update for flatpak | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1535-1 Security update for flatpak | 0% Низкий | около 1 года назад | |
![]() | RLSA-2024:3961 Important: flatpak security update | 0% Низкий | 12 месяцев назад | |
![]() | RLSA-2024:3959 Important: flatpak security update | 0% Низкий | 12 месяцев назад | |
ELSA-2024-3980 ELSA-2024-3980: flatpak security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-3961 ELSA-2024-3961: flatpak security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-3959 ELSA-2024-3959: flatpak security update (IMPORTANT) | около 1 года назад |
Уязвимостей на страницу