unofficial mirror of bug-guix@gnu.org 
 help / color / mirror / code / Atom feed
* bug#70539: Flatpak is vulnerable to CVE-2024-32462
@ 2024-04-23 16:59 DonaldSanders1968 via Bug reports for GNU Guix
  2024-04-24  2:46 ` Z572
  0 siblings, 1 reply; 2+ messages in thread
From: DonaldSanders1968 via Bug reports for GNU Guix @ 2024-04-23 16:59 UTC (permalink / raw)
  To: 70539

[-- Attachment #1: Type: text/plain, Size: 220 bytes --]

Hi Guix,

Flatpak before versions 1.10.9, 1.12.9, 1.14.6, and 1.15.8 is vulnerable to [CVE-2024-32462](https://nvd.nist.gov/vuln/detail/CVE-2024-32462). Currently what we have is in version 1.14.4.

Kind regards,

Donald

[-- Attachment #2: Type: text/html, Size: 740 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* bug#70539: Flatpak is vulnerable to CVE-2024-32462
  2024-04-23 16:59 bug#70539: Flatpak is vulnerable to CVE-2024-32462 DonaldSanders1968 via Bug reports for GNU Guix
@ 2024-04-24  2:46 ` Z572
  0 siblings, 0 replies; 2+ messages in thread
From: Z572 @ 2024-04-24  2:46 UTC (permalink / raw)
  To: DonaldSanders1968; +Cc: 70539-done

[-- Attachment #1: Type: text/plain, Size: 111 bytes --]


Thanks, fix in https://git.savannah.gnu.org/cgit/guix.git/commit/?id=d115af1bcc48f07a40dafd94d1d00926d446d068

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-04-25 15:59 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-04-23 16:59 bug#70539: Flatpak is vulnerable to CVE-2024-32462 DonaldSanders1968 via Bug reports for GNU Guix
2024-04-24  2:46 ` Z572

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).