CVE-2021-21261
- EPSS 0.21%
- Veröffentlicht 14.01.2021 20:15:12
- Zuletzt bearbeitet 21.11.2024 05:47:53
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox es...
- EPSS 0.11%
- Veröffentlicht 26.03.2019 14:29:00
- Zuletzt bearbeitet 21.11.2024 04:18:19
Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could other...
CVE-2019-8308
- EPSS 0.06%
- Veröffentlicht 12.02.2019 23:29:00
- Zuletzt bearbeitet 21.11.2024 04:49:39
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
CVE-2018-6560
- EPSS 0.09%
- Veröffentlicht 02.02.2018 14:29:01
- Zuletzt bearbeitet 21.11.2024 04:10:54
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in...
CVE-2017-9780
- EPSS 0.02%
- Veröffentlicht 21.06.2017 15:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
In Flatpak before 0.8.7, a third-party app repository could include malicious apps that contain files with inappropriate permissions, for example setuid or world-writable. The files are deployed with those permissions, which would let a local attacke...