lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190212214554.y52kz6btzcgcmbvi@seger.debian.org>
Date: Tue, 12 Feb 2019 21:45:54 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4390-1] flatpak security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4390-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 12, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : flatpak
CVE ID         : not yet available
Debian Bug     : 922059

It was discovered that Flatpak, an application deployment framework for
desktop apps, insufficiently restricted the execution of "apply_extra"
scripts which could potentially result in privilege escalation.

For the stable distribution (stretch), this problem has been fixed in
version 0.8.9-0+deb9u2.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=XUDS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ