Groups | Search | Server Info | Login | Register
Groups > linux.debian.announce.security > #4789
| From | Moritz Muehlenhoff <jmm@debian.org> |
|---|---|
| Newsgroups | linux.debian.announce.security |
| Subject | [SECURITY] [DSA 6223-1] flatpak security update |
| Date | 2026-04-22 10:50 +0200 |
| Message-ID | <MMBrs-h5z1-43@gated-at.bofh.it> (permalink) |
| Organization | linux.* mail to news gateway |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6223-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 22, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : flatpak CVE ID : CVE-2026-34078 CVE-2026-34079 Multiple security vulnerabilities were discovered in Flatpak, an application deployment framework for desktop apps, which could allow a Flatpak app to delete arbitrary hosts on the host or break out of the sandbox resulting in code execution in the host context. For the oldstable distribution (bookworm), these problems have been fixed in version 1.14.10-1~deb12u2. We recommend that you upgrade your flatpak packages. For the detailed security status of flatpak please refer to its security tracker page at: https://security-tracker.debian.org/tracker/flatpak Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmnoiDkACgkQEMKTtsN8 TjauqhAAoDeD7cTvwSgToGICI5PvZpK54Z/2is0xb6FDInSOYAfmvRCw7aAjAHEE dzT5rGiMacgQPAGM6l3AQQiF3ekppy0F9Nt5UzwP4O+yxPCHqIpT+jV3K5yE3Fha tNtXeBV5B+iLDbtI3Uxern81diPIWvqe7eH8f+JEXgB2dRH4BHqwpVPZtP27xtPe +qAxuM0XoFPIXodKvnbG5x53qailca1qE+7bt1uNSxm/8pa24SxQ58lS6MSL/2tX tt28Qba0ehp11HFXCE69oqE0l3WqRBJiG70OoALyiYp6ODMfoBPdf103SYreToWp t28HGJpwTG1o/qH5zrzgFjdXrR9RlMds2GRx6Clm4vEgZ70eW6L3J1KCPlM1/N34 W0R13mpLnjZeXbXJbRRKYhvi3+9DAwZIHuiwGfpyzuH2asRpkk50mo4tTB+QwPCv bUdfje5dWqnDbrBXJ/SVND0OpH5ZCpPunjCjtAZ3FwqD/zVaHrTK8ujMuZG3lVxj Mqg3e0LXLwgeP9Aa8N5dpYshhnY6Mfn1MHPmvMByzhDKEF5xKhFfuX8XQ+wZfyAP MN0CMks+xHGdy3ItnccD/0e3vxhGfy7+KggwHwMYdc4GrztG7mBJs5bW+HBQhRh0 ivi+PEChbT22WI9ffR05Z8WoXieCAOpGIU4pOz+itlGEHf/op7A= =1JY4 -----END PGP SIGNATURE-----
Back to linux.debian.announce.security | Previous | Next | Find similar
[SECURITY] [DSA 6223-1] flatpak security update Moritz Muehlenhoff <jmm@debian.org> - 2026-04-22 10:50 +0200
csiph-web