- Issued:
- 2022-11-08
- Updated:
- 2022-11-08
RHBA-2022:7860 - Bug Fix Advisory
Synopsis
flatpak-runtime and flatpak-sdk container images update
Type/Severity
Bug Fix Advisory
Topic
Updated flatpak-runtime and flatpak-sdk container images are now available in the Red Hat Container Registry.
Description
Flatpak is a system for running graphical applications as containers. A Flatpak application has access to content from two container images - the application itself, and the runtime image. To build against a particular runtime image, a corresponding SDK image is used.
flatpak-runtime provides the runtime image and flatpak-sdk provides the SDK image.
This updates the flatpak-runtime and the flatpak-sdk container images in the Red Hat Container Registry.
Solution
To install and use Red Hat Enterprise Linux Flatpak content available in the the Red Hat Container Catalog, make sure that you have the latest version of the Flatpak client installed on your system:
yum update flatpak
After updating the Flatpak packages, add the Flatpak remote to your system. This enables the Flatpak client and gnome-software to find RHEL Flatpak content available on the Red Hat Container Catalog:
flatpak remote-add rhel https://flatpaks.redhat.io/rhel.flatpakrepo
Provide the credentials for your Red Hat Enterprise Linux account:
podman login registry.redhat.io
Podman only saves credentials until the user logs out. To save your credentials permanently, run:
cp $XDG_RUNTIME_DIR/containers/auth.json $HOME/.config/flatpak/oci-auth.json
To enable the RHEL Flatpak remote for a set of workstations within an organization, you should use a Registry Service Account. Credentials can be installed system-wide at /etc/flatpak/oci-auth.json.
Then, you can install the runtime and the SDK:
flatpak install rhel com.redhat.Platform//el8
flatpak install rhel com.redhat.Sdk//el8
Generally, you do not need to install the runtime explicitly. It is installed along with an application that uses it.
If you have previously installed the runtime or SDK, you can update to the latest version by running:
flatpak update
The SDK is used by using flatpak-builder with a manifest that includes:
{
[...]
"runtime": "com.redhat.Platform",
"runtime-version": "el8",
"sdk": "com.redhat.Sdk",
}
For more information about the image, search the <image_name> in the Red Hat Ecosystem Catalog: https://catalog.redhat.com/software/containers/search.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
Fixes
- BZ - 2118533 - Update flatpak-runtime and flatpak-sdk for 8.7
- BZ - 2118679 - rebuild of flatpak-runtime-container 8.7
- BZ - 2118687 - rebuild of flatpak-sdk-container 8.7
CVEs
- CVE-2016-3709
- CVE-2020-36516
- CVE-2020-36558
- CVE-2021-3640
- CVE-2021-30002
- CVE-2021-44269
- CVE-2022-0168
- CVE-2022-0561
- CVE-2022-0562
- CVE-2022-0617
- CVE-2022-0854
- CVE-2022-0865
- CVE-2022-0891
- CVE-2022-0908
- CVE-2022-0909
- CVE-2022-0924
- CVE-2022-1016
- CVE-2022-1048
- CVE-2022-1055
- CVE-2022-1184
- CVE-2022-1304
- CVE-2022-1355
- CVE-2022-1852
- CVE-2022-2078
- CVE-2022-2319
- CVE-2022-2320
- CVE-2022-2586
- CVE-2022-2639
- CVE-2022-2938
- CVE-2022-3515
- CVE-2022-20368
- CVE-2022-21499
- CVE-2022-22624
- CVE-2022-22628
- CVE-2022-22629
- CVE-2022-22662
- CVE-2022-22844
- CVE-2022-23960
- CVE-2022-24448
- CVE-2022-25255
- CVE-2022-25308
- CVE-2022-25309
- CVE-2022-25310
- CVE-2022-26373
- CVE-2022-26700
- CVE-2022-26709
- CVE-2022-26710
- CVE-2022-26716
- CVE-2022-26717
- CVE-2022-26719
- CVE-2022-27404
- CVE-2022-27405
- CVE-2022-27406
- CVE-2022-27950
- CVE-2022-28390
- CVE-2022-28893
- CVE-2022-29581
- CVE-2022-30293
- CVE-2022-30698
- CVE-2022-30699
- CVE-2022-36946
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.