flatpak-selinux vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the flatpak-selinux package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Arbitrary Code Injection

<0:1.8.7-4.el8_6
  • H
Arbitrary Code Injection

<0:1.8.7-4.el8_6
  • H
Arbitrary Code Injection

<0:1.8.7-4.el8_6
  • H
Arbitrary Code Injection

<0:1.10.7-4.el8_8
  • H
Arbitrary Code Injection

<0:1.10.7-4.el8_8
  • H
Arbitrary Code Injection

<0:1.10.7-4.el8_8
  • H
Arbitrary Code Injection

<0:1.10.7-4.el8_8
  • H
Arbitrary Code Injection

<0:1.8.5-7.el8_4
  • H
Arbitrary Code Injection

<0:1.8.5-7.el8_4
  • H
Arbitrary Code Injection

<0:1.8.5-7.el8_4
  • H
Arbitrary Code Injection

<0:1.6.2-9.el8_2
  • H
Arbitrary Code Injection

<0:1.12.9-3.el8_10
  • H
Arbitrary Argument Injection

<0:1.10.7-2.el8_8
  • H
Arbitrary Argument Injection

<0:1.10.7-2.el8_8
  • H
Arbitrary Argument Injection

<0:1.10.7-2.el8_8
  • H
Arbitrary Argument Injection

<0:1.8.7-2.el8_6
  • H
Arbitrary Argument Injection

<0:1.8.7-2.el8_6
  • H
Arbitrary Argument Injection

<0:1.10.7-2.el8_8
  • H
Arbitrary Argument Injection

<0:1.8.7-2.el8_6
  • H
Arbitrary Argument Injection

<0:1.8.5-5.el8_4
  • H
Arbitrary Argument Injection

<0:1.8.5-5.el8_4
  • H
Arbitrary Argument Injection

<0:1.8.5-5.el8_4
  • H
Arbitrary Argument Injection

<0:1.6.2-7.el8_2
  • H
Arbitrary Argument Injection

<0:1.12.9-1.el8_10
  • M
Improper Encoding or Escaping of Output

<0:1.10.8-1.el8
  • M
Improper Input Validation

<0:1.10.8-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • M
Incorrect Default Permissions

<0:1.8.7-1.el8
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.6.2-6.el8_2
  • H
Improper Input Validation

<0:1.6.2-6.el8_2
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.6.2-6.el8_2
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.6.2-6.el8_2
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Input Validation

<0:1.8.5-4.el8_4
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-5.el8_2
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-5.el8_2
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-5.el8_2
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-5.el8_2
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Improper Access Control

<0:1.6.2-6.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-4.el8_2
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-4.el8_2
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-4.el8_2
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-4.el8_2
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3
  • H
Arbitrary Command Injection

<0:1.6.2-5.el8_3