Fedora Linux 8648 Published by

A flatpak security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: flatpak-1.12.8-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-9fbc701e0d
2023-04-02 01:33:23.803349
--------------------------------------------------------------------------------

Name : flatpak
Product : Fedora 36
Version : 1.12.8
Release : 1.fc36
URL :   http://flatpak.org/
Summary : Application deployment framework for desktop apps
Description :
flatpak is a system for building, distributing and running sandboxed desktop
applications on Linux. See   https://wiki.gnome.org/Projects/SandboxedApps for
more information.

--------------------------------------------------------------------------------
Update Information:

Update to 1.12.8 * Fix CVE-2023-28100 and CVE-2023-28101
--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar 17 2023 David King - 1.12.8-1
- Update to 1.12.8
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2179219 - CVE-2023-28101 flatpak: Metadata with ANSI control codes can cause misleading terminal output
  https://bugzilla.redhat.com/show_bug.cgi?id=2179219
[ 2 ] Bug #2179220 - CVE-2023-28100 flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console
  https://bugzilla.redhat.com/show_bug.cgi?id=2179220
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-9fbc701e0d' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________