![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2018-6560 |
Description: | In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.882947 1.3.6.1.4.1.25623.1.1.10.2018.0143 1.3.6.1.4.1.25623.1.1.2.2019.2146 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-6560 RedHat Security Advisories: RHSA-2018:2766 https://access.redhat.com/errata/RHSA-2018:2766 |