Логотип exploitDog
bind:CVE-2024-42472
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42472

Количество 17

Количество 17

ubuntu логотип

CVE-2024-42472

10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI...

CVSS3: 10
EPSS: Низкий
redhat логотип

CVE-2024-42472

10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2024-42472

10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`

CVSS3: 10
EPSS: Низкий
debian логотип

CVE-2024-42472

10 месяцев назад

Flatpak is a Linux application sandboxing and distribution framework. ...

CVSS3: 10
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3174-1

9 месяцев назад

Security update for bubblewrap and flatpak

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3104-1

10 месяцев назад

Security update for bubblewrap and flatpak

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3073-1

10 месяцев назад

Security update for bubblewrap and flatpak

EPSS: Низкий
redos логотип

ROS-20240902-23

10 месяцев назад

Уязвимость bubblewrap

CVSS3: 10
EPSS: Низкий
redos логотип

ROS-20240902-18

10 месяцев назад

Уязвимость flatpak

CVSS3: 10
EPSS: Низкий
rocky логотип

RLSA-2024:9449

7 месяцев назад

Important: bubblewrap and flatpak security update

EPSS: Низкий
rocky логотип

RLSA-2024:6422

9 месяцев назад

Important: bubblewrap and flatpak security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9449

7 месяцев назад

ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6422

10 месяцев назад

ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6417

9 месяцев назад

ELSA-2024-6417: flatpak security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6356

10 месяцев назад

ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-06671

10 месяцев назад

Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 10
EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2025:0145-1

5 месяцев назад

Recommended update for bubblewrap, flatpak, wayland-protocols

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-42472

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI...

CVSS3: 10
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-42472

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...

CVSS3: 7.4
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-42472

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`

CVSS3: 10
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-42472

Flatpak is a Linux application sandboxing and distribution framework. ...

CVSS3: 10
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3174-1

Security update for bubblewrap and flatpak

0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3104-1

Security update for bubblewrap and flatpak

0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3073-1

Security update for bubblewrap and flatpak

0%
Низкий
10 месяцев назад
redos логотип
ROS-20240902-23

Уязвимость bubblewrap

CVSS3: 10
0%
Низкий
10 месяцев назад
redos логотип
ROS-20240902-18

Уязвимость flatpak

CVSS3: 10
0%
Низкий
10 месяцев назад
rocky логотип
RLSA-2024:9449

Important: bubblewrap and flatpak security update

0%
Низкий
7 месяцев назад
rocky логотип
RLSA-2024:6422

Important: bubblewrap and flatpak security update

0%
Низкий
9 месяцев назад
oracle-oval логотип
ELSA-2024-9449

ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT)

7 месяцев назад
oracle-oval логотип
ELSA-2024-6422

ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-6417

ELSA-2024-6417: flatpak security update (IMPORTANT)

9 месяцев назад
oracle-oval логотип
ELSA-2024-6356

ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT)

10 месяцев назад
fstec логотип
BDU:2024-06671

Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 10
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-RU-2025:0145-1

Recommended update for bubblewrap, flatpak, wayland-protocols

5 месяцев назад

Уязвимостей на страницу