First published: Mon Feb 11 2019(Updated: )
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/flatpak | <1.2.3 | 1.2.3 |
redhat/flatpak | <1.0.7 | 1.0.7 |
debian/flatpak | <=0.8.9-0+deb9u1<=1.2.2-1<=0.8.5-2+deb9u1<=1.2.0-1~bpo9+1<=0.8.9-0+deb9u1~bpo8+1 | 1.2.3-1 0.8.9-0+deb9u2 |
Flatpak Flatpak | <1.0.7 | |
Flatpak Flatpak | >=1.1.0<=1.1.3 | |
Flatpak Flatpak | >=1.2.0<=1.2.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8308 is a vulnerability in Flatpak before version 1.0.7 and 1.1.x and 1.2.x before 1.2.3.
CVE-2019-8308 exposes /proc in the apply_extra script sandbox of Flatpak, allowing attackers to modify a host-side executable file.
The severity of CVE-2019-8308 is critical with a CVSS score of 8.2.
To fix CVE-2019-8308, update your Flatpak installation to version 1.2.3 or apply the appropriate remedy provided by your distribution or package manager.
You can find more information about CVE-2019-8308 on the Debian Security Tracker, Flatpak mailing list, and the Flatpak GitHub page.