Important: flatpak

2019-03-21T19:31:00
ID ALAS2-2019-1183
Type amazon
Reporter Amazon
Modified 2019-03-21T19:31:00

Description

Issue Overview:

Earlier versions of flatpak exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.(CVE-2019-8308 __)

Affected Packages:

flatpak

Issue Correction:
Run yum update flatpak to update your system.

New Packages:

aarch64:  
    flatpak-1.0.2-4.amzn2.0.1.aarch64  
    flatpak-builder-1.0.0-4.amzn2.0.1.aarch64  
    flatpak-devel-1.0.2-4.amzn2.0.1.aarch64  
    flatpak-libs-1.0.2-4.amzn2.0.1.aarch64  
    flatpak-debuginfo-1.0.2-4.amzn2.0.1.aarch64

i686:  
    flatpak-1.0.2-4.amzn2.0.1.i686  
    flatpak-builder-1.0.0-4.amzn2.0.1.i686  
    flatpak-devel-1.0.2-4.amzn2.0.1.i686  
    flatpak-libs-1.0.2-4.amzn2.0.1.i686  
    flatpak-debuginfo-1.0.2-4.amzn2.0.1.i686

src:  
    flatpak-1.0.2-4.amzn2.0.1.src

x86_64:  
    flatpak-1.0.2-4.amzn2.0.1.x86_64  
    flatpak-builder-1.0.0-4.amzn2.0.1.x86_64  
    flatpak-devel-1.0.2-4.amzn2.0.1.x86_64  
    flatpak-libs-1.0.2-4.amzn2.0.1.x86_64  
    flatpak-debuginfo-1.0.2-4.amzn2.0.1.x86_64