*** This bug is a security vulnerability ***

Public security bug reported:

Please sync flatpak 1.2.3-2 (universe) from Debian unstable (main)

Changelog entries since current disco version 1.2.3-1:

flatpak (1.2.3-2) unstable; urgency=high

  * seccomp: Reject all ioctls that the kernel will interpret as TIOCSTI,
    including those where the high 32 bits in a 64-bit word are nonzero.
    (Closes: #925541, CVE-2019-10063)

 -- Simon McVittie <[email protected]>  Tue, 26 Mar 2019 20:38:36 +0000

** Affects: flatpak (Ubuntu)
     Importance: Undecided
         Status: New

** Summary changed:

- Sync flatpak 1.2.3-2 (universe) from Debian unstable (main)
+ Sync flatpak 1.2.3-2 (universe) from Debian unstable (main) for CVE-2019-10063

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1822024

Title:
  Sync flatpak 1.2.3-2 (universe) from Debian unstable (main) for
  CVE-2019-10063

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1822024/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to