Fedora Linux 8783 Published by

A js-jquery-ui security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: js-jquery-ui-1.13.2-1.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-7291b78111
2022-11-21 01:06:59.777731
--------------------------------------------------------------------------------

Name : js-jquery-ui
Product : Fedora 37
Version : 1.13.2
Release : 1.fc37
URL :   https://jqueryui.com/
Summary : jQuery user interface
Description :
A curated set of user interface interactions, effects, widgets, and
themes built on top of the jQuery JavaScript Library.

--------------------------------------------------------------------------------
Update Information:

A flaw was found in the jquery-UI package. Affected versions of this package are
vulnerable to Cross-site scripting (XSS) attack via the initialization of a
check-box-radio widget on an input tag enclosed within a label, leading to the
parent label contents being considered as the input label.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 11 2022 Mattias Ellert - 1.13.2-1
- Update to version 1.13.2
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2110708 - CVE-2022-31160 js-jquery-ui: jqueryui: CVE-2022-31160 [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2110708
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-7291b78111' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________