This bug was fixed in the package flatpak - 1.6.5-0ubuntu0.4
--------------- flatpak (1.6.5-0ubuntu0.4) focal-security; urgency=medium
* SECURITY UPDATE: Sandbox bypass via recent VFS-manipulating syscalls (LP: #1946578) - debian/paches/CVE-2021-41133-1.patch - debian/paches/CVE-2021-41133-2.patch - debian/paches/CVE-2021-41133-3.patch - debian/paches/CVE-2021-41133-4.patch - debian/paches/CVE-2021-41133-5.patch - debian/paches/CVE-2021-41133-6.patch - debian/paches/CVE-2021-41133-7.patch - debian/paches/CVE-2021-41133-8.patch - debian/paches/CVE-2021-41133-9.patch - debian/paches/CVE-2021-41133-10.patch - CVE-2021-41133
-- Andrew Hayzen <email address hidden> Wed, 13 Oct 2021 00:36:35 +0100
This bug was fixed in the package flatpak - 1.6.5-0ubuntu0.4
---------------
flatpak (1.6.5-0ubuntu0.4) focal-security; urgency=medium
* SECURITY UPDATE: Sandbox bypass via recent VFS-manipulating syscalls paches/ CVE-2021- 41133-1. patch paches/ CVE-2021- 41133-2. patch paches/ CVE-2021- 41133-3. patch paches/ CVE-2021- 41133-4. patch paches/ CVE-2021- 41133-5. patch paches/ CVE-2021- 41133-6. patch paches/ CVE-2021- 41133-7. patch paches/ CVE-2021- 41133-8. patch paches/ CVE-2021- 41133-9. patch paches/ CVE-2021- 41133-10. patch
(LP: #1946578)
- debian/
- debian/
- debian/
- debian/
- debian/
- debian/
- debian/
- debian/
- debian/
- debian/
- CVE-2021-41133
-- Andrew Hayzen <email address hidden> Wed, 13 Oct 2021 00:36:35 +0100