Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
2019-02-12T23:29:00.317
2024-11-21T04:49:39.810
Modified
CVSSv3.0: 8.2 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | flatpak | flatpak | < 1.0.7 | Yes |
Application | flatpak | flatpak | ≤ 1.1.3 | Yes |
Application | flatpak | flatpak | ≤ 1.2.3 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | redhat | enterprise_linux_desktop | 7.0 | Yes |
Operating System | redhat | enterprise_linux_server | 7.0 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_server_eus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 7.6 | Yes |
Operating System | redhat | enterprise_linux_workstation | 7.0 | Yes |