First published: Mon Feb 11 2019(Updated: )
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Flatpak Flatpak | <1.0.7 | |
Flatpak Flatpak | >=1.1.0<=1.1.3 | |
Flatpak Flatpak | >=1.2.0<=1.2.3 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/flatpak | <1.2.3 | 1.2.3 |
redhat/flatpak | <1.0.7 | 1.0.7 |
<1.0.7 | ||
>=1.1.0<=1.1.3 | ||
>=1.2.0<=1.2.3 | ||
=9.0 | ||
=10.0 | ||
=7.0 | ||
=7.0 | ||
=7.6 | ||
=7.6 | ||
=7.6 | ||
=7.0 | ||
debian/flatpak | <=0.8.9-0+deb9u1<=1.2.2-1<=0.8.5-2+deb9u1<=1.2.0-1~bpo9+1<=0.8.9-0+deb9u1~bpo8+1 | 1.2.3-1 0.8.9-0+deb9u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8308 is a vulnerability in Flatpak before version 1.0.7 and 1.1.x and 1.2.x before 1.2.3.
CVE-2019-8308 exposes /proc in the apply_extra script sandbox of Flatpak, allowing attackers to modify a host-side executable file.
The severity of CVE-2019-8308 is critical with a CVSS score of 8.2.
To fix CVE-2019-8308, update your Flatpak installation to version 1.2.3 or apply the appropriate remedy provided by your distribution or package manager.
You can find more information about CVE-2019-8308 on the Debian Security Tracker, Flatpak mailing list, and the Flatpak GitHub page.