Fedora Linux 8568 Published by

A flatpak security update has been released for Fedora Linux 35.



SECURITY: Fedora 35 Update: flatpak-1.12.3-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-825ca6bf2b
2022-01-17 01:56:23.484955
--------------------------------------------------------------------------------

Name : flatpak
Product : Fedora 35
Version : 1.12.3
Release : 1.fc35
URL :   http://flatpak.org/
Summary : Application deployment framework for desktop apps
Description :
flatpak is a system for building, distributing and running sandboxed desktop
applications on Linux. See   https://wiki.gnome.org/Projects/SandboxedApps for
more information.

--------------------------------------------------------------------------------
Update Information:

Update to 1.12.3 Fixes these two security issues: * CVE-2021-43860 or
  https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j *
CVE-2022-21682 or
  https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx Full
release notes:   https://github.com/flatpak/flatpak/releases/tag/1.12.3
--------------------------------------------------------------------------------
ChangeLog:

* Fri Jan 14 2022 Debarshi Ray - 1.12.3-1
- Update to 1.12.3 (#2040094)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2040094 - flatpak-1.12.3 is available
  https://bugzilla.redhat.com/show_bug.cgi?id=2040094
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-825ca6bf2b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________