{"affected":[{"ecosystem_specific":{"binaries":[{"flatpak":"1.10.5-4.9.1","flatpak-devel":"1.10.5-4.9.1","flatpak-zsh-completion":"1.10.5-4.9.1","libflatpak0":"1.10.5-4.9.1","system-user-flatpak":"1.10.5-4.9.1","typelib-1_0-Flatpak-1_0":"1.10.5-4.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"flatpak","purl":"pkg:rpm/opensuse/flatpak&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.10.5-4.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for flatpak fixes the following issues:\n\n- Update to version 1.10.5:\n- CVE-2021-41133: Fixed a bug that could lead to sandbox bypass via recent VFS-manipulating syscalls. (bsc#1191507)\n","id":"openSUSE-SU-2021:3472-1","modified":"2021-10-20T06:40:50Z","published":"2021-10-20T06:40:50Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXL4FA3WICXGFNYWHOG3GKOXZERBN6TL/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-41133"}],"related":["CVE-2021-41133"],"summary":"Security update for flatpak","upstream":["CVE-2021-41133"]}