Логотип exploitDog
bind:"CVE-2021-41133"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-41133"

Количество 13

Количество 13

ubuntu логотип

CVE-2021-41133

почти 4 года назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `...

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2021-41133

почти 4 года назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `...

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-41133

почти 4 года назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2021-41133

почти 4 года назад

Flatpak is a system for building, distributing, and running sandboxed ...

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3472-1

почти 4 года назад

Security update for flatpak

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1400-1

почти 4 года назад

Security update for flatpak

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3439-1

почти 3 года назад

Security update for flatpak

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3472-1

почти 4 года назад

Security update for flatpak

EPSS: Низкий
rocky логотип

RLSA-2021:4042

почти 4 года назад

Important: flatpak security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4044

почти 4 года назад

ELSA-2021-4044: flatpak security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4042

почти 4 года назад

ELSA-2021-4042: flatpak security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2022-00259

почти 4 года назад

Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3284-1

почти 3 года назад

Security update for flatpak

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-41133

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `...

CVSS3: 8.8
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-41133

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `...

CVSS3: 8.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-41133

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg

CVSS3: 8.8
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-41133

Flatpak is a system for building, distributing, and running sandboxed ...

CVSS3: 8.8
0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:3472-1

Security update for flatpak

0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:1400-1

Security update for flatpak

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:3439-1

Security update for flatpak

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2021:3472-1

Security update for flatpak

0%
Низкий
почти 4 года назад
rocky логотип
RLSA-2021:4042

Important: flatpak security update

0%
Низкий
почти 4 года назад
oracle-oval логотип
ELSA-2021-4044

ELSA-2021-4044: flatpak security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-4042

ELSA-2021-4042: flatpak security update (IMPORTANT)

почти 4 года назад
fstec логотип
BDU:2022-00259

Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:3284-1

Security update for flatpak

почти 3 года назад

Уязвимостей на страницу