Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update


Chronologisch Thread  
  • From: Moritz Muehlenhoff <jmm AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update
  • Date: Fri, 19 Apr 2024 17:41:07 +0000
  • List-archive: https://lists.debian.org/msgid-search/ZiKssyQ8awiP+Z/9 AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=izzH7PabaAk/RlAbdDdaa8/GE8G6wRF6h8GSd63jDSU=; b=tY i/3tTWDN8DYy9OEyqD4zrJ6SHrcO2i6NyclI4H0famXZ/sCWS0pih+kBb682FiqtrF3Hchfqlf5Jj MkK/9Nmf4JSTsyo1J/VxsIMkdh0YgJa5BM8H+35Mpvi5xkHGJnEV/vbT8b3g34GRuSdK1Mzt4OV8G yiv6hhg4ikrbwEDWZ5aAVXJ70meZ0E900cb9qnKhouEB57Ivc6a5cQZAb8/zHAydcyKAjZC/TSf59 EaYqin37LE9QQDMtyfXDJFxW6D6pB5tZRRUOpteRzM2VbBkmDjaRSL7qnEuDSZYP4ABwxkUIiEVKi 3DbSLTieh1bn7RkX8+6HuLaVaSl1KoPg==;
  • Old-return-path: <jmm AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Fri, 19 Apr 2024 17:41:32 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <UO261enYkEE.A._iB.MzqImB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5666-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 19, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : flatpak
CVE ID : CVE-2024-32462

Gergo Koteles discovered that sandbox restrictions in Flatpak, an
application deployment framework for desktop apps, could by bypassed in
combination with xdg-desktop-portal.

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.10.8-0+deb11u2.

For the stable distribution (bookworm), this problem has been fixed in
version 1.14.4-1+deb12u1.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=VYOY
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5666-1] flatpak security update, Moritz Muehlenhoff, 19.04.2024

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang