CVE-2018-6560

Severity
8.8HIGH
EPSS
0.1%
top 73.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateMay 13

Description

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages5 packages

Also affects: Enterprise Linux 7.6, 7.5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5xcx-r88v-8v7g: In dbus-proxy/flatpak-proxy2022-05-13
CVEList
CVE-2018-6560: In dbus-proxy/flatpak-proxy2018-02-02
OSV
CVE-2018-6560: In dbus-proxy/flatpak-proxy2018-02-02

📋Vendor Advisories

2
Red Hat
flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake2018-01-29
Debian
CVE-2018-6560: flatpak - In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x befo...2018

💬Community

1
Bugzilla
CVE-2018-6560 flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake2018-02-05