{"id":58902,"date":"2024-08-15T18:59:48","date_gmt":"2024-08-15T15:59:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/180170\/dsa-5749-1.txt"},"modified":"2024-08-15T18:59:48","modified_gmt":"2024-08-15T15:59:48","slug":"debian-security-advisory-5749-1","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/debian-security-advisory-5749-1\/","title":{"rendered":"Debian Security Advisory 5749-1"},"content":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>Hash: SHA512<\/p>\n<p>&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>Debian Security Advisory DSA-5749-1 security@debian.org<br \/>https:\/\/www.debian.org\/security\/ Salvatore Bonaccorso<br \/>August 14, 2024 https:\/\/www.debian.org\/security\/faq<br \/>&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>Package : flatpak<br \/>CVE ID : CVE-2024-42472<\/p>\n<p>Chris Williams discovered a flaw in the handling of mounts for<br \/>persistent directories in Flatpak, an application deployment framework<br \/>for desktop apps. A malicious or compromised Flatpak app using<br \/>persistent directories could take advantage of this flaw to access files<br \/>outside of the sandbox.<\/p>\n<p>Details can be found in the upstream advisory at<br \/>https:\/\/github.com\/flatpak\/flatpak\/security\/advisories\/GHSA-7hgv-f2j8-xw87<\/p>\n<p>For the stable distribution (bookworm), this problem has been fixed in<br \/>version 1.14.10-1~deb12u1. To address the vulnerability, flatpak uses a<br \/>new feature provided in bubblewrap and provided in version<br \/>0.8.0-2+deb12u1 along with this update.<\/p>\n<p>We recommend that you upgrade your flatpak packages.<\/p>\n<p>For the detailed security status of flatpak please refer to its security<br \/>tracker page at:<br \/>https:\/\/security-tracker.debian.org\/tracker\/flatpak<\/p>\n<p>Further information about Debian Security Advisories, how to apply<br \/>these updates to your system and frequently asked questions can be<br \/>found at: https:\/\/www.debian.org\/security\/<\/p>\n<p>Mailing list: debian-security-announce@lists.debian.org<br \/>&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<\/p>\n<p>iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAma9F2xfFIAAAAAALgAo<br \/>aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2<br \/>NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND<br \/>z0RINg\/+OTenWEWdoatoO7F+184SOoVMYmmJTP2xtvuE8XC6S6NAcrYzjRQD1nyy<br \/>xJK1IFmNjJrTf4HhfFTq2raOy60T6KRa0y71R1QS4+JOwNjdtr+zzDxdybXzg06T<br \/>SOBKaLmped3PY4djFxoYnl9wEDLM+QAQuTWvnZugim4frEErmtlulwHRDA\/qhWKT<br \/>mzFiJgSWB7EJL61ddh2YVexru0b5rD6gyYcD7JoulbFjsOwvKyJhI4j1uuOrbNoj<br \/>7aArjlu9D3KymGQgCc5gg8yVp5Gt\/ZFYsmFJ5BdAl5a8LmTBM4mMTDIsK39mPoLo<br \/>waxpP0bJIfCxkNB+YOyJRPdj4mtT44nwDcG\/LyM+M+f+R0HUr4Apftloheb72A0q<br \/>XUS2tRrBEs0CzToeuwkIoo2XLQt7\/vQ4HFMU47gtk6ZDKqIk7hWD0zcny8x3wL+p<br \/>\/Syd2xOA\/KEmbLWFRDzoVVxpmLdkbqGJn+5p5FObMjOPNOFKyMs0Q7HukwKbyPGn<br \/>YRhg1lcmOn30MWVFol2Z1Ex74IB\/\/Wu\/az7YZ4UIId1Y734NUVXEoTLvXGKV8Hnx<br \/>9m\/0imWcz51T5DLqCv7MUX1i9V2s2R3Hj8GqQfVQTA39IH4GEmpZMR33XH\/jvCDu<br \/>p1GDW2KzIzObmLu+Kjkeg3NzRl\/pKdDFiJncdNVG0PPhEn2hUY0=<br \/>=hd0W<br \/>&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;Hash: SHA512 &#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-Debian Security Advisory DSA-5749-1 security@debian.orghttps:\/\/www.debian.org\/security\/ Salvatore BonaccorsoAugust 14, 2024 https:\/\/www.debian.org\/security\/faq&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- Package : flatpakCVE ID : CVE-2024-42472 Chris Williams discovered a flaw in the handling of mounts forpersistent directories in Flatpak, an application deployment frameworkfor desktop apps. A malicious or compromised Flatpak app usingpersistent directories could take advantage of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-58902","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=58902"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58902\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=58902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=58902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=58902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}