Количество 17
Количество 17

CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI...

CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`...

CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`
CVE-2024-42472
Flatpak is a Linux application sandboxing and distribution framework. ...

SUSE-SU-2024:3174-1
Security update for bubblewrap and flatpak

SUSE-SU-2024:3104-1
Security update for bubblewrap and flatpak

SUSE-SU-2024:3073-1
Security update for bubblewrap and flatpak

ROS-20240902-23
Уязвимость bubblewrap

ROS-20240902-18
Уязвимость flatpak

RLSA-2024:9449
Important: bubblewrap and flatpak security update

RLSA-2024:6422
Important: bubblewrap and flatpak security update
ELSA-2024-9449
ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT)
ELSA-2024-6422
ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT)
ELSA-2024-6417
ELSA-2024-6417: flatpak security update (IMPORTANT)
ELSA-2024-6356
ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT)

BDU:2024-06671
Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

SUSE-RU-2025:0145-1
Recommended update for bubblewrap, flatpak, wayland-protocols
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPI... | CVSS3: 10 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID`... | CVSS3: 7.4 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality. When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access. However, the application does have write access to the application directory `~/.var/app/$APPID` | CVSS3: 10 | 0% Низкий | 10 месяцев назад |
CVE-2024-42472 Flatpak is a Linux application sandboxing and distribution framework. ... | CVSS3: 10 | 0% Низкий | 10 месяцев назад | |
![]() | SUSE-SU-2024:3174-1 Security update for bubblewrap and flatpak | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3104-1 Security update for bubblewrap and flatpak | 0% Низкий | 10 месяцев назад | |
![]() | SUSE-SU-2024:3073-1 Security update for bubblewrap and flatpak | 0% Низкий | 10 месяцев назад | |
![]() | ROS-20240902-23 Уязвимость bubblewrap | CVSS3: 10 | 0% Низкий | 10 месяцев назад |
![]() | ROS-20240902-18 Уязвимость flatpak | CVSS3: 10 | 0% Низкий | 10 месяцев назад |
![]() | RLSA-2024:9449 Important: bubblewrap and flatpak security update | 0% Низкий | 7 месяцев назад | |
![]() | RLSA-2024:6422 Important: bubblewrap and flatpak security update | 0% Низкий | 9 месяцев назад | |
ELSA-2024-9449 ELSA-2024-9449: bubblewrap and flatpak security update (IMPORTANT) | 7 месяцев назад | |||
ELSA-2024-6422 ELSA-2024-6422: bubblewrap and flatpak security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-6417 ELSA-2024-6417: flatpak security update (IMPORTANT) | 9 месяцев назад | |||
ELSA-2024-6356 ELSA-2024-6356: bubblewrap and flatpak security update (IMPORTANT) | 10 месяцев назад | |||
![]() | BDU:2024-06671 Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с неправильной нейтрализацией специальных элементов на выходе, используемых нижестоящим компонентом, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 10 | 0% Низкий | 10 месяцев назад |
![]() | SUSE-RU-2025:0145-1 Recommended update for bubblewrap, flatpak, wayland-protocols | 5 месяцев назад |
Уязвимостей на страницу