ALT-BU-2021-4686-1
Branch sisyphus_e2k update bulletin.
Package gifsicle updated to version 1.93-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-02071
Уязвимость функции find_color_or_error пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-19752
The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference.
Package boost updated to version 1.77.0-alt1 for branch sisyphus_e2k.
Closed bugs
Предлагаю не собирать python2-часть boost
Package file updated to version 5.41-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2015-00377
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00378
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00379
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-01282
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06092
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06093
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06094
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06095
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06096
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09797
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09882
Уязвимость интерпретатора PHP, позволяющая удалённому злоумышленнику получить доступ к области памяти за пределами границ приложения или вызвать аварийное завершение приложения
BDU:2015-10226
Уязвимость интерпретатора PHP, позволяющая удалённому нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему
BDU:2020-01768
Уязвимость функции cdf_read_property_info инструмента для классификации типов файлов file, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
- http://bugs.gw.com/view.php?id=313
- http://bugs.gw.com/view.php?id=313
- openSUSE-SU-2014:0364
- openSUSE-SU-2014:0364
- openSUSE-SU-2014:0367
- openSUSE-SU-2014:0367
- openSUSE-SU-2014:0435
- openSUSE-SU-2014:0435
- RHSA-2014:1765
- RHSA-2014:1765
- [oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2873
- DSA-2873
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- USN-2162-1
- USN-2162-1
- USN-2163-1
- USN-2163-1
- https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
- https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
- GLSA-201503-08
- GLSA-201503-08
Modified: 2024-11-21
CVE-2014-3479
The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68241
- 68241
- https://bugs.php.net/bug.php?id=67411
- https://bugs.php.net/bug.php?id=67411
- https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67
- https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-3480
The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68238
- 68238
- https://bugs.php.net/bug.php?id=67412
- https://bugs.php.net/bug.php?id=67412
- https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
- https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-3487
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68120
- 68120
- https://bugs.php.net/bug.php?id=67413
- https://bugs.php.net/bug.php?id=67413
- https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
- https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-8117
softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
- http://advisories.mageia.org/MGASA-2015-0040.html
- http://advisories.mageia.org/MGASA-2015-0040.html
- RHSA-2016:0760
- RHSA-2016:0760
- [oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117
- [oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117
- 61944
- 61944
- 62081
- 62081
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71692
- 71692
- 1031344
- 1031344
- USN-2494-1
- USN-2494-1
- USN-2535-1
- USN-2535-1
- https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog
- https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog
- https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c
- https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c
- FreeBSD-SA-14:28
- FreeBSD-SA-14:28
Modified: 2024-11-21
CVE-2014-9652
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
- http://bugs.gw.com/view.php?id=398
- http://bugs.gw.com/view.php?id=398
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- SUSE-SU-2015:0424
- SUSE-SU-2015:0424
- SUSE-SU-2015:0436
- SUSE-SU-2015:0436
- openSUSE-SU-2015:0440
- openSUSE-SU-2015:0440
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- RHSA-2015:1053
- RHSA-2015:1053
- RHSA-2015:1066
- RHSA-2015:1066
- RHSA-2015:1135
- RHSA-2015:1135
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72505
- 72505
- https://bugs.php.net/bug.php?id=68735
- https://bugs.php.net/bug.php?id=68735
- https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079
- https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079
- https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
- https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
- GLSA-201701-42
- GLSA-201701-42
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
Modified: 2024-11-21
CVE-2014-9653
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
- http://bugs.gw.com/view.php?id=409
- http://bugs.gw.com/view.php?id=409
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- [file] 20141216 [PATCH] readelf.c: better checks for values returned by pread
- [file] 20141216 [PATCH] readelf.c: better checks for values returned by pread
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- RHSA-2016:0760
- RHSA-2016:0760
- DSA-3196
- DSA-3196
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72516
- 72516
- https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
- https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
- GLSA-201701-42
- GLSA-201701-42
- USN-3686-1
- USN-3686-1
Modified: 2024-11-21
CVE-2019-18218
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
- openSUSE-SU-2020:0677
- openSUSE-SU-2020:0677
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
- https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
- https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
- [debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update
- [debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- FEDORA-2019-97dcb2762a
- FEDORA-2019-97dcb2762a
- FEDORA-2019-18036b898e
- FEDORA-2019-18036b898e
- FEDORA-2019-554c3c691f
- FEDORA-2019-554c3c691f
- GLSA-202003-24
- GLSA-202003-24
- https://security.netapp.com/advisory/ntap-20200115-0001/
- https://security.netapp.com/advisory/ntap-20200115-0001/
- USN-4172-1
- USN-4172-1
- USN-4172-2
- USN-4172-2
- DSA-4550
- DSA-4550
Package gptfdisk updated to version 1.0.8-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-01665
Уязвимость функции LoadPartitionTable компонента gpt.cc инструмента для разметки диска GPT fdisk, нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-01696
Уязвимость функции ReadLogicalParts компонента basicmbr.cc инструмента для разметки диска GPT fdisk, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-0256
In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864
Modified: 2024-11-21
CVE-2021-0308
In ReadLogicalParts of basicmbr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158063095.
Package gmp updated to version 6.2.1-alt4 for branch sisyphus_e2k.
Closed bugs
Не провайдит __gmpn_fft_best_k и __gmpn_mul_fft
Package glm updated to version 0.9.9.8-alt1 for branch sisyphus_e2k.
Closed bugs
glm: update to 0.9.9.8
Package distcc updated to version 3.4-alt7 for branch sisyphus_e2k.
Closed bugs
distcc: не может подключиться к серверу по IPv6
Package gnuplot updated to version 5.4.2-alt3 for branch sisyphus_e2k.
Closed bugs
Несовместимость библиотек
Package glances updated to version 3.2.4.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-02263
Уязвимость инструмента мониторинга Glances, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-23418
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/issues/1025
- https://github.com/nicolargo/glances/issues/1025
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
Package flatpak updated to version 1.12.2-alt2.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-00259
Уязвимость инструмента для управления приложениями и средами Flatpak, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-41133
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
- [oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006
- [oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006
- https://github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999
- https://github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999
- https://github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca
- https://github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca
- https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf
- https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf
- https://github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36
- https://github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36
- https://github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48
- https://github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48
- https://github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f
- https://github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f
- https://github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330
- https://github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330
- https://github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf
- https://github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- FEDORA-2021-4b201d15e6
- FEDORA-2021-4b201d15e6
- FEDORA-2021-c5a9c85737
- FEDORA-2021-c5a9c85737
- GLSA-202312-12
- GLSA-202312-12
- DSA-4984
- DSA-4984
Closed bugs
Сделать исполняемым /etc/profile.d/flatpak.sh