This bug was fixed in the package flatpak - 1.0.8-0ubuntu0.18.04.1
---
flatpak (1.0.8-0ubuntu0.18.04.1) bionic-security; urgency=medium
* Update to 1.0.8 (LP: #1821811)
* New upstream release
- SECURITY UPDATE: seccomp: Reject all ioctls that the kernel will
interpret as
This bug was fixed in the package flatpak - 1.0.8-0ubuntu0.18.10.1
---
flatpak (1.0.8-0ubuntu0.18.10.1) cosmic-security; urgency=medium
* Update to 1.0.8 (LP: #1821811)
* New upstream release
- SECURITY UPDATE: seccomp: Reject all ioctls that the kernel will
interpret as
Paulo, I have tested the following flatpak versions on bionic and
cosmic, they appear to work correctly and the debdiffs match the ones I
generated - so LGTM :-)
$ apt policy flatpak
flatpak:
Installed: 1.0.8-0ubuntu0.18.04.1
Candidate: 1.0.8-0ubuntu0.18.04.1
Version table:
*** 1.0.8-0ubunt
Thanks Paulo, I'm afk on holiday at the moment, so will test this when I'm
back towards the end of the week, thanks!
On Fri, 3 May 2019, 01:35 Paulo Flabiano Smorigo, <
1821...@bugs.launchpad.net> wrote:
> Hello Andrew, can you check/test if the packages bellow are working
> properly?
>
> https:/
Hello Andrew, can you check/test if the packages bellow are working properly?
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=flatpak
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
Is there anything else I need to do to help this update ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821811
Title:
New upstream microrelease flatpak 1.0.8
To manage notifications about this bug
Excellent, thanks Andrew.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821811
Title:
New upstream microrelease flatpak 1.0.8
To manage notifications about this bug go to:
https://bugs.launchpad.n
Hi,
I used pull-lp-source flatpak {bionic,cosmic}, then uscan --download-
version 1.0.8 and uupdate, as there is a new upstream release with this
fix.
For bionic these are the sha256sum's in my build folder
85e9f11188fde70fa6c4b1e17b1bc61d1ea5abf9fe4e0d956c3f421deaace4da
flatpak_1.0.7-0ubuntu
Hello Andrew, thanks for taking this update.
Could you confirm the sha256sum of the tarball you used while generating
this?
I think the right approach for this update is going to be to upload a
new package with new tarball, and edit the diff to keep only the
debian/changelog hunk. It's important
** Also affects: flatpak (Ubuntu Cosmic)
Importance: Undecided
Status: New
** Also affects: flatpak (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: flatpak (Ubuntu)
Status: Confirmed => Fix Released
** Tags added: upgrade-software-version
** Changed i
This has been fixed in disco as per version 1.2.4-1. Is someone able to
nominate this bug for bionic and cosmic, and mark the main bug as fixed
released. (I don't have permission to nominate for series)
** Summary changed:
- New upstream microrelease flatpak 1.0.X
+ New upstream microrelease fla
11 matches
Mail list logo