Количество 17
Количество 17
BDU:2024-06671
Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. ...
SUSE-SU-2024:3174-1
Security update for bubblewrap and flatpak
SUSE-SU-2024:3104-1
Security update for bubblewrap and flatpak
SUSE-SU-2024:3073-1
Security update for bubblewrap and flatpak
ROS-20240902-23
Уязвимость bubblewrap
ROS-20240902-18
Уязвимость flatpak
RLSA-2024:9449
Important: bubblewrap and flatpak security update
RLSA-2024:6422
Important: bubblewrap and flatpak security update
ELSA-2024-9449
ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT)
ELSA-2024-6422
ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT)
ELSA-2024-6417
ELSA-2024-6417: flatpak security update (IMPORTANT)
ELSA-2024-6356
ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT)
SUSE-RU-2025:0145-1
Recommended update for bubblewrap, flatpak, wayland-protocols
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-06671 Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 10 | 6% Низкий | около 1 года назад | |
CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`... | CVSS3: 10 | 6% Низкий | около 1 года назад | |
CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`... | CVSS3: 7.4 | 6% Низкий | около 1 года назад | |
CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` | CVSS3: 10 | 6% Низкий | около 1 года назад | |
CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. ... | CVSS3: 10 | 6% Низкий | около 1 года назад | |
SUSE-SU-2024:3174-1 Security update for bubblewrap and flatpak | 6% Низкий | около 1 года назад | ||
SUSE-SU-2024:3104-1 Security update for bubblewrap and flatpak | 6% Низкий | около 1 года назад | ||
SUSE-SU-2024:3073-1 Security update for bubblewrap and flatpak | 6% Низкий | около 1 года назад | ||
ROS-20240902-23 Уязвимость bubblewrap | CVSS3: 10 | 6% Низкий | около 1 года назад | |
ROS-20240902-18 Уязвимость flatpak | CVSS3: 10 | 6% Низкий | около 1 года назад | |
RLSA-2024:9449 Important: bubblewrap and flatpak security update | 6% Низкий | 12 месяцев назад | ||
RLSA-2024:6422 Important: bubblewrap and flatpak security update | 6% Низкий | около 1 года назад | ||
ELSA-2024-9449 ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT) | 12 месяцев назад | |||
ELSA-2024-6422 ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-6417 ELSA-2024-6417: flatpak security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-6356 ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT) | около 1 года назад | |||
SUSE-RU-2025:0145-1 Recommended update for bubblewrap, flatpak, wayland-protocols | 10 месяцев назад |
Уязвимостей на страницу