it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update
- Date: Fri, 19 Apr 2024 17:41:07 +0000
- List-archive: https://lists.debian.org/msgid-search/ZiKssyQ8awiP+Z/9 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=izzH7PabaAk/RlAbdDdaa8/GE8G6wRF6h8GSd63jDSU=; b=tY i/3tTWDN8DYy9OEyqD4zrJ6SHrcO2i6NyclI4H0famXZ/sCWS0pih+kBb682FiqtrF3Hchfqlf5Jj MkK/9Nmf4JSTsyo1J/VxsIMkdh0YgJa5BM8H+35Mpvi5xkHGJnEV/vbT8b3g34GRuSdK1Mzt4OV8G yiv6hhg4ikrbwEDWZ5aAVXJ70meZ0E900cb9qnKhouEB57Ivc6a5cQZAb8/zHAydcyKAjZC/TSf59 EaYqin37LE9QQDMtyfXDJFxW6D6pB5tZRRUOpteRzM2VbBkmDjaRSL7qnEuDSZYP4ABwxkUIiEVKi 3DbSLTieh1bn7RkX8+6HuLaVaSl1KoPg==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 19 Apr 2024 17:41:32 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <UO261enYkEE.A._iB.MzqImB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5666-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 19, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : flatpak
CVE ID : CVE-2024-32462
Gergo Koteles discovered that sandbox restrictions in Flatpak, an
application deployment framework for desktop apps, could by bypassed in
combination with xdg-desktop-portal.
For the oldstable distribution (bullseye), this problem has been fixed
in version 1.10.8-0+deb11u2.
For the stable distribution (bookworm), this problem has been fixed in
version 1.14.4-1+deb12u1.
We recommend that you upgrade your flatpak packages.
For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=VYOY
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update, Moritz Muehlenhoff, 19.04.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.