aboutsummaryrefslogtreecommitdiffstats
path: root/danish/security/2021/dsa-4984.wml
blob: 7407bfa09782fadf09515111dae0d3ed09a5ad2b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
#use wml::debian::translation-check translation="5004ac5f8a314d76777de79849730426b3f783fc" mindelta="1"
<define-tag description>sikkerhedsopdatering</define-tag>
<define-tag moreinfo>
<p>Man opdagede at sandkassebegrænsninger i Flatpak, et 
applikationsudrulningsframework til skrivebordsapps, kunne omgås for en 
Flatpak-app med direkte adgang til AF_UNIX-sockets, ved at manipulere med VFS'en 
med brug af mount-relaterede syscalls, som ikke er blokeret af Flatpaks 
denylist-seccomp-filter.</p>

<p>Flere oplysninger finder man i opstrøms bulletin på 
<a href="https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q">\
https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q</a></p>

<p>I den stabile distribution (bullseye), er dette problem rettet i
version 1.10.5-0+deb11u1.</p>

<p>Vi anbefaler at du opgraderer dine flatpak-pakker.</p>

<p>For detaljeret sikkerhedsstatus vedrørende flatpak, se
dens sikkerhedssporingssidede på:
<a href="https://security-tracker.debian.org/tracker/flatpak">\
https://security-tracker.debian.org/tracker/flatpak</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2021/dsa-4984.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy