ID CVE-2019-8308
Summary Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
References
Vulnerable Configurations
  • cpe:2.3:a:flatpak:flatpak:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.11:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.11:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.12:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.12:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.98:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.98:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.98.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.98.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.98.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.98.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.9.99:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.9.99:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.7:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.7:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.8:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.8:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.11.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.11.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.99.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.99.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.99.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.99.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:0.99.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:0.99.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:flatpak:flatpak:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:flatpak:flatpak:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVSS
Base: 4.4 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE CWE-668
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
bugzilla
id 1675070
title CVE-2019-8308 flatpak: potential /proc based sandbox escape
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 7 is installed
      oval oval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • comment flatpak is earlier than 0:1.0.2-4.el7_6
          oval oval:com.redhat.rhsa:tst:20190375001
        • comment flatpak is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20182766002
      • AND
        • comment flatpak-builder is earlier than 0:1.0.0-4.el7_6
          oval oval:com.redhat.rhsa:tst:20190375003
        • comment flatpak-builder is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20182766004
      • AND
        • comment flatpak-devel is earlier than 0:1.0.2-4.el7_6
          oval oval:com.redhat.rhsa:tst:20190375005
        • comment flatpak-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20182766006
      • AND
        • comment flatpak-libs is earlier than 0:1.0.2-4.el7_6
          oval oval:com.redhat.rhsa:tst:20190375007
        • comment flatpak-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20182766008
rhsa
id RHSA-2019:0375
released 2019-02-19
severity Important
title RHSA-2019:0375: flatpak security update (Important)
rpms
  • flatpak-0:1.0.2-4.el7_6
  • flatpak-builder-0:1.0.0-4.el7_6
  • flatpak-debuginfo-0:1.0.2-4.el7_6
  • flatpak-devel-0:1.0.2-4.el7_6
  • flatpak-libs-0:1.0.2-4.el7_6
refmap via4
misc
suse openSUSE-SU-2019:2038
Last major update 24-08-2020 - 17:37
Published 12-02-2019 - 23:29
Last modified 24-08-2020 - 17:37
Back to Top