First published: Fri Feb 02 2018(Updated: )
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/flatpak | <0.8.9 | 0.8.9 |
redhat/flatpak | <0.10.3 | 0.10.3 |
Flatpak Flatpak | <0.8.9 | |
Flatpak Flatpak | >=0.9.1<=0.9.99 | |
Flatpak Flatpak | >=0.10.0<0.10.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6560 is high with a CVSS score of 8.8.
Crafted D-Bus messages to the host can be used to break out of the sandbox.
Flatpak versions before 0.8.9, 0.9.x, and 0.10.x before 0.10.3 are affected.
Upgrade to Flatpak version 0.8.9 or later, 0.9.x or later, or 0.10.3 or later.
You can find more information about CVE-2018-6560 at the following references: [link1](https://access.redhat.com/errata/RHSA-2018:2766), [link2](https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6), [link3](https://github.com/flatpak/flatpak/releases/tag/0.10.3)