It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and write files in locations it would not normally have access to. A patch was also needed to Bubblewrap in order to avoid race conditions caused by this fix.
{
"binaries": [
{
"binary_name": "bubblewrap",
"binary_version": "0.4.0-1ubuntu4.1"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_name": "flatpak",
"binary_version": "1.6.5-0ubuntu0.5"
},
{
"binary_name": "flatpak-tests",
"binary_version": "1.6.5-0ubuntu0.5"
},
{
"binary_name": "gir1.2-flatpak-1.0",
"binary_version": "1.6.5-0ubuntu0.5"
},
{
"binary_name": "libflatpak-dev",
"binary_version": "1.6.5-0ubuntu0.5"
},
{
"binary_name": "libflatpak0",
"binary_version": "1.6.5-0ubuntu0.5"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_name": "bubblewrap",
"binary_version": "0.6.1-1ubuntu0.1"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_name": "flatpak",
"binary_version": "1.12.7-1ubuntu0.1"
},
{
"binary_name": "flatpak-tests",
"binary_version": "1.12.7-1ubuntu0.1"
},
{
"binary_name": "gir1.2-flatpak-1.0",
"binary_version": "1.12.7-1ubuntu0.1"
},
{
"binary_name": "libflatpak-dev",
"binary_version": "1.12.7-1ubuntu0.1"
},
{
"binary_name": "libflatpak0",
"binary_version": "1.12.7-1ubuntu0.1"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:22.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_name": "bubblewrap",
"binary_version": "0.9.0-1ubuntu0.1"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_name": "flatpak",
"binary_version": "1.14.6-1ubuntu0.1"
},
{
"binary_name": "flatpak-tests",
"binary_version": "1.14.6-1ubuntu0.1"
},
{
"binary_name": "gir1.2-flatpak-1.0",
"binary_version": "1.14.6-1ubuntu0.1"
},
{
"binary_name": "libflatpak-dev",
"binary_version": "1.14.6-1ubuntu0.1"
},
{
"binary_name": "libflatpak0",
"binary_version": "1.14.6-1ubuntu0.1"
}
],
"availability": "No subscription required"
}"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7046-1.json"
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"id": "CVE-2024-42472",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}