what you don't know can hurt you

Debian Security Advisory 4390-1

Debian Security Advisory 4390-1
Posted Feb 13, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4390-1 - It was discovered that Flatpak, an application deployment framework for desktop apps, insufficiently restricted the execution of "apply_extra" scripts which could potentially result in privilege escalation.

tags | advisory
systems | linux, debian
MD5 | 13d7a7f331164f0fb1b842af7cafe3a2

Debian Security Advisory 4390-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4390-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 12, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : flatpak
CVE ID : not yet available
Debian Bug : 922059

It was discovered that Flatpak, an application deployment framework for
desktop apps, insufficiently restricted the execution of "apply_extra"
scripts which could potentially result in privilege escalation.

For the stable distribution (stretch), this problem has been fixed in
version 0.8.9-0+deb9u2.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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XUDS
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    32 Files
  • 20
    Feb 20th
    7 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close