CVE-2018-6560

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/02/2018
Last modified:
03/10/2019

Description

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:* 0.8.9 (excluding)
cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:* 0.9.1 (including) 0.9.99 (including)
cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:* 0.10.0 (including) 0.10.3 (excluding)
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*