It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it would not normally have access to. A patch was also needed to Bubblewrap in order to avoid race conditions caused by this fix.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "0.4.0-1ubuntu4.1",
"binary_name": "bubblewrap"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.6.5-0ubuntu0.5",
"binary_name": "flatpak"
},
{
"binary_version": "1.6.5-0ubuntu0.5",
"binary_name": "flatpak-tests"
},
{
"binary_version": "1.6.5-0ubuntu0.5",
"binary_name": "gir1.2-flatpak-1.0"
},
{
"binary_version": "1.6.5-0ubuntu0.5",
"binary_name": "libflatpak-dev"
},
{
"binary_version": "1.6.5-0ubuntu0.5",
"binary_name": "libflatpak0"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "0.6.1-1ubuntu0.1",
"binary_name": "bubblewrap"
}
]
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.12.7-1ubuntu0.1",
"binary_name": "flatpak"
},
{
"binary_version": "1.12.7-1ubuntu0.1",
"binary_name": "flatpak-tests"
},
{
"binary_version": "1.12.7-1ubuntu0.1",
"binary_name": "gir1.2-flatpak-1.0"
},
{
"binary_version": "1.12.7-1ubuntu0.1",
"binary_name": "libflatpak-dev"
},
{
"binary_version": "1.12.7-1ubuntu0.1",
"binary_name": "libflatpak0"
}
]
}{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "0.9.0-1ubuntu0.1",
"binary_name": "bubblewrap"
}
]
}{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.14.6-1ubuntu0.1",
"binary_name": "flatpak"
},
{
"binary_version": "1.14.6-1ubuntu0.1",
"binary_name": "flatpak-tests"
},
{
"binary_version": "1.14.6-1ubuntu0.1",
"binary_name": "gir1.2-flatpak-1.0"
},
{
"binary_version": "1.14.6-1ubuntu0.1",
"binary_name": "libflatpak-dev"
},
{
"binary_version": "1.14.6-1ubuntu0.1",
"binary_name": "libflatpak0"
}
]
}{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2024-42472"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"