[SECURITY] [DSA 4390-1] flatpak security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4390-1                   security@xxxxxxxxxx
https://www.debian.org/security/                       Moritz Muehlenhoff
February 12, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : flatpak
CVE ID         : not yet available
Debian Bug     : 922059

It was discovered that Flatpak, an application deployment framework for
desktop apps, insufficiently restricted the execution of "apply_extra"
scripts which could potentially result in privilege escalation.

For the stable distribution (stretch), this problem has been fixed in
version 0.8.9-0+deb9u2.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
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=XUDS
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux