From unknown Sun Jun 15 08:30:15 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#55072 <55072@debbugs.gnu.org> To: bug#55072 <55072@debbugs.gnu.org> Subject: Status: [PATCH]: Do not leak GDK_PIXBUF_MODULE_FILE into the sandbox. Reply-To: bug#55072 <55072@debbugs.gnu.org> Date: Sun, 15 Jun 2025 15:30:15 +0000 retitle 55072 [PATCH]: Do not leak GDK_PIXBUF_MODULE_FILE into the sandbox. reassign 55072 guix-patches submitter 55072 Zhu Zihao severity 55072 normal tag 55072 patch thanks From debbugs-submit-bounces@debbugs.gnu.org Fri Apr 22 22:47:15 2022 Received: (at submit) by debbugs.gnu.org; 23 Apr 2022 02:47:15 +0000 Received: from localhost ([127.0.0.1]:54943 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ni5nh-0003i5-40 for submit@debbugs.gnu.org; Fri, 22 Apr 2022 22:47:15 -0400 Received: from lists.gnu.org ([209.51.188.17]:49302) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ni5nc-0003ht-M6 for submit@debbugs.gnu.org; Fri, 22 Apr 2022 22:47:08 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:40782) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ni5nb-0004f5-FZ for guix-patches@gnu.org; Fri, 22 Apr 2022 22:47:03 -0400 Received: from mail-m973.mail.163.com ([123.126.97.3]:21647) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1ni5nR-0006mP-Uu for guix-patches@gnu.org; Fri, 22 Apr 2022 22:46:57 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-ID:MIME-Version; bh=m48sJ 4vDgddmu3Yys63Uu5LewFLs8wBlWwNw/ToQ27E=; b=o+CUQ3mE1ZkKObK7Bbay+ sICkyNTlHXcRxqyMrXH6DjeeVVP3oDMWxnY5PBpdBsTAJNsYFZhYUDMPjH+8gJ26 zl54wDh4n0ONu8grGmPKDVa+WP6eLx71LnfRYD7+JKx162VwzijhyFZYZrqFFG+I pl9PqzUFEp0vrjFC/kOoj0= Received: from asus-laptop (unknown [163.125.202.140]) by smtp3 (Coremail) with SMTP id G9xpCgB3DZCMaGNislHCCg--.16237S2; Sat, 23 Apr 2022 10:46:38 +0800 (CST) User-agent: mu4e 1.6.10; emacs 27.2 From: Zhu Zihao To: guix-patches@gnu.org Subject: [PATCH]: Do not leak GDK_PIXBUF_MODULE_FILE into the sandbox. Date: Sat, 23 Apr 2022 10:45:47 +0800 Message-ID: <86ilr0o6t4.fsf@163.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=-=-=" X-CM-TRANSID: G9xpCgB3DZCMaGNislHCCg--.16237S2 X-Coremail-Antispam: 1Uf129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73 VFW2AGmfu7bjvjm3AaLaJ3UbIYCTnIWIevJa73UjIFyTuYvjxU0lkVDUUUU X-Originating-IP: [163.125.202.140] X-CM-SenderInfo: pdoosuxxwbztlvw6il2tof0z/xtbBPQ7rr2AY-9FqdgAAs9 Received-SPF: pass client-ip=123.126.97.3; envelope-from=all_but_last@163.com; helo=mail-m973.mail.163.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: 0.2 (/) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -0.1 (/) --=-=-= Content-Type: multipart/signed; boundary="==-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" --==-=-= Content-Type: text/plain --==-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iIsEARYIADMWIQRefA5qkqvnKdl/GTlmOX+E92aT+QUCYmNohxUcYWxsX2J1dF9s YXN0QDE2My5jb20ACgkQZjl/hPdmk/l+qwEAnDgfdFUzH1nnXFlxPFJ4bKxx5FTk eYexdAnvEaIxw0kBAPTZI2txd3pUJTi1INrmFDthGAJQczjXf0hPumj8EkgN =jT8/ -----END PGP SIGNATURE----- --==-=-=-- --=-=-= Content-Type: text/x-patch; charset=utf-8 Content-Disposition: inline; filename=0001-gnu-bubblewrap-Update-to-0.6.1.patch Content-Transfer-Encoding: quoted-printable >From affd34d0f0bf6bf04110b595ce77ed8e9448b2c7 Mon Sep 17 00:00:00 2001 From: Zhu Zihao Date: Thu, 21 Apr 2022 18:48:51 +0800 Subject: [PATCH 1/3] gnu: bubblewrap: Update to 0.6.1. * gnu/packages/virtualization.scm (bubblewrap): Update to 0.6.1. --- gnu/packages/virtualization.scm | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/gnu/packages/virtualization.scm b/gnu/packages/virtualization.= scm index f3396e7c94..3f7c6312f2 100644 --- a/gnu/packages/virtualization.scm +++ b/gnu/packages/virtualization.scm @@ -27,6 +27,7 @@ ;;; Copyright =C2=A9 2022 Oleg Pykhalov ;;; Copyright =C2=A9 2022 Ekaitz Zarraga ;;; Copyright =C2=A9 2022 Arun Isaac +;;; Copyright =C2=A9 2022 Zhu Zihao ;;; ;;; This file is part of GNU Guix. ;;; @@ -1950,7 +1951,7 @@ (define-public python-vagrant (define-public bubblewrap (package (name "bubblewrap") - (version "0.5.0") + (version "0.6.1") (source (origin (method url-fetch) (uri (string-append "https://github.com/containers/bubblewra= p/" @@ -1958,7 +1959,7 @@ (define-public bubblewrap version ".tar.xz")) (sha256 (base32 - "0608l2sjwhnb1c0mslah1h6yjvqr17wk60by6i710qwxg4rszz8n")) + "10ij62jg7p2scwdx0pm141ss7p2gjdkbbymb56y8miib2vfcf2cn")) (patches (search-patches "bubblewrap-fix-locale-in-tests.pa= tch")))) (build-system gnu-build-system) (arguments --=20 2.35.1 --=-=-= Content-Type: text/x-patch Content-Disposition: inline; filename=0002-gnu-flatpak-Use-G-expressions.patch >From 3432b64e34d5df329c31b1a09f476ff01a743245 Mon Sep 17 00:00:00 2001 From: Zhu Zihao Date: Thu, 21 Apr 2022 18:52:21 +0800 Subject: [PATCH 2/3] gnu: flatpak: Use G-expressions. * gnu/packages/package-management.scm (flatpak): Fix indentation. [arguments]: Use G-expressions. --- gnu/packages/package-management.scm | 183 ++++++++++++++-------------- 1 file changed, 92 insertions(+), 91 deletions(-) diff --git a/gnu/packages/package-management.scm b/gnu/packages/package-management.scm index 9c5db0d608..2ea639d376 100644 --- a/gnu/packages/package-management.scm +++ b/gnu/packages/package-management.scm @@ -1795,103 +1795,104 @@ (define-public libostree (define-public flatpak (package - (name "flatpak") - (version "1.12.7") - (source - (origin - (method url-fetch) - (uri (string-append "https://github.com/flatpak/flatpak/releases/download/" - version "/flatpak-" version ".tar.xz")) - (sha256 - (base32 "05lkpbjiwp69q924i1jfyk5frcqbdbv9kyzbqwm2hy723i9jmdbd")) - (patches (search-patches "flatpak-fix-path.patch")))) + (name "flatpak") + (version "1.12.7") + (source + (origin + (method url-fetch) + (uri (string-append "https://github.com/flatpak/flatpak/releases/download/" + version "/flatpak-" version ".tar.xz")) + (sha256 + (base32 "05lkpbjiwp69q924i1jfyk5frcqbdbv9kyzbqwm2hy723i9jmdbd")) + (patches (search-patches "flatpak-fix-path.patch")))) - ;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to - ;; find the TLS backend in glib-networking. - (build-system glib-or-gtk-build-system) + ;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to + ;; find the TLS backend in glib-networking. + (build-system glib-or-gtk-build-system) - (arguments - '(#:configure-flags - (list - "--enable-documentation=no" ;; FIXME - "--enable-system-helper=no" - "--localstatedir=/var" - (string-append "--with-system-bubblewrap=" - (assoc-ref %build-inputs "bubblewrap") - "/bin/bwrap") - (string-append "--with-system-dbus-proxy=" - (assoc-ref %build-inputs "xdg-dbus-proxy") - "/bin/xdg-dbus-proxy")) + (arguments + (list + #:configure-flags + #~(list + "--enable-documentation=no" ;; FIXME + "--enable-system-helper=no" + "--localstatedir=/var" + (string-append "--with-system-bubblewrap=" + (assoc-ref %build-inputs "bubblewrap") + "/bin/bwrap") + (string-append "--with-system-dbus-proxy=" + (assoc-ref %build-inputs "xdg-dbus-proxy") + "/bin/xdg-dbus-proxy")) #:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-tests - (lambda* (#:key inputs #:allow-other-keys) - (copy-recursively - (search-input-directory inputs "lib/locale") - "/tmp/locale") - (for-each make-file-writable (find-files "/tmp")) - (substitute* "tests/make-test-runtime.sh" - (("cp `which.*") "echo guix\n") - (("cp -r /usr/lib/locale/C\\.\\*") - (string-append "mkdir ${DIR}/usr/lib/locale/en_US; \ + #~(modify-phases %standard-phases + (add-after 'unpack 'fix-tests + (lambda* (#:key inputs #:allow-other-keys) + (copy-recursively + (search-input-directory inputs "lib/locale") + "/tmp/locale") + (for-each make-file-writable (find-files "/tmp")) + (substitute* "tests/make-test-runtime.sh" + (("cp `which.*") "echo guix\n") + (("cp -r /usr/lib/locale/C\\.\\*") + (string-append "mkdir ${DIR}/usr/lib/locale/en_US; \ cp -r /tmp/locale/*/en_US.*"))) - (substitute* "tests/libtest.sh" - (("/bin/kill") (which "kill")) - (("/usr/bin/python3") (which "python3"))) - #t)) - (add-after 'unpack 'p11-kit-fix - (lambda* (#:key inputs #:allow-other-keys) - (let ((p11-path (search-input-file inputs "/bin/p11-kit"))) - (substitute* "session-helper/flatpak-session-helper.c" - (("\"p11-kit\",") - (string-append "\"" p11-path "\",")) - (("if \\(g_find_program_in_path \\(\"p11-kit\"\\)\\)") - (string-append "if (g_find_program_in_path (\"" - p11-path "\"))")))))) - ;; Many tests fail for unknown reasons, so we just run a few basic - ;; tests. - (replace 'check - (lambda _ - (setenv "HOME" "/tmp") - (invoke "make" "check" - "TESTS=tests/test-basic.sh tests/test-config.sh testcommon")))))) - (native-inputs - (list bison - dbus ; for dbus-daemon - gettext-minimal - `(,glib "bin") ; for glib-mkenums + gdbus-codegen - glibc-utf8-locales - gobject-introspection - libcap - pkg-config - python - python-pyparsing - socat - which)) - (inputs - (list appstream-glib - bubblewrap - dconf - fuse - gdk-pixbuf - gpgme - json-glib - libarchive - libostree - libseccomp - libsoup-minimal-2 - libxau - libxml2 - p11-kit-next - util-linux - xdg-dbus-proxy)) - (propagated-inputs (list glib-networking gnupg gsettings-desktop-schemas)) - (home-page "https://flatpak.org") - (synopsis "System for building, distributing, and running sandboxed desktop + (substitute* "tests/libtest.sh" + (("/bin/kill") (which "kill")) + (("/usr/bin/python3") (which "python3"))) + #t)) + (add-after 'unpack 'p11-kit-fix + (lambda* (#:key inputs #:allow-other-keys) + (let ((p11-path (search-input-file inputs "/bin/p11-kit"))) + (substitute* "session-helper/flatpak-session-helper.c" + (("\"p11-kit\",") + (string-append "\"" p11-path "\",")) + (("if \\(g_find_program_in_path \\(\"p11-kit\"\\)\\)") + (string-append "if (g_find_program_in_path (\"" + p11-path "\"))")))))) + ;; Many tests fail for unknown reasons, so we just run a few basic + ;; tests. + (replace 'check + (lambda _ + (setenv "HOME" "/tmp") + (invoke "make" "check" + "TESTS=tests/test-basic.sh tests/test-config.sh testcommon")))))) + (native-inputs + (list bison + dbus ; for dbus-daemon + gettext-minimal + `(,glib "bin") ; for glib-mkenums + gdbus-codegen + glibc-utf8-locales + gobject-introspection + libcap + pkg-config + python + python-pyparsing + socat + which)) + (inputs + (list appstream-glib + bubblewrap + dconf + fuse + gdk-pixbuf + gpgme + json-glib + libarchive + libostree + libseccomp + libsoup-minimal-2 + libxau + libxml2 + p11-kit-next + util-linux + xdg-dbus-proxy)) + (propagated-inputs (list glib-networking gnupg gsettings-desktop-schemas)) + (home-page "https://flatpak.org") + (synopsis "System for building, distributing, and running sandboxed desktop applications") - (description "Flatpak is a system for building, distributing, and running + (description "Flatpak is a system for building, distributing, and running sandboxed desktop applications on GNU/Linux.") - (license license:lgpl2.1+))) + (license license:lgpl2.1+))) (define-public akku (package -- 2.35.1 --=-=-= Content-Type: text/x-patch Content-Disposition: inline; filename=0003-gnu-flatpak-Do-not-leak-GDK_PIXBUF_MODULE_FILE-into-.patch >From 5f1369f8731cc1b35c3c80aac6ad7ebd89d3cb10 Mon Sep 17 00:00:00 2001 From: Zhu Zihao Date: Sat, 23 Apr 2022 10:39:32 +0800 Subject: [PATCH 3/3] gnu: flatpak: Do not leak GDK_PIXBUF_MODULE_FILE into the sandbox. Fixes https://issues.guix.gnu.org/54784. * gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch: New file. * gnu/local.mk (dist_patch_DATA): Add corresponding entry. * gnu/packages/package-management.scm (flatpak)[source]: Use patch. --- gnu/local.mk | 1 + gnu/packages/package-management.scm | 4 +++- ...flatpak-unset-gdk-pixbuf-for-sandbox.patch | 19 +++++++++++++++++++ 3 files changed, 23 insertions(+), 1 deletion(-) create mode 100644 gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch diff --git a/gnu/local.mk b/gnu/local.mk index 9bad87710c..ce25b0f21e 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1070,6 +1070,7 @@ dist_patch_DATA = \ %D%/packages/patches/findutils-localstatedir.patch \ %D%/packages/patches/flann-cmake-3.11.patch \ %D%/packages/patches/flatpak-fix-path.patch \ + %D%/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch \ %D%/packages/patches/fontconfig-cache-ignore-mtime.patch \ %D%/packages/patches/foobillard++-pkg-config.patch \ %D%/packages/patches/foomatic-filters-CVE-2015-8327.patch \ diff --git a/gnu/packages/package-management.scm b/gnu/packages/package-management.scm index 2ea639d376..1ab293e2dd 100644 --- a/gnu/packages/package-management.scm +++ b/gnu/packages/package-management.scm @@ -1804,7 +1804,9 @@ (define-public flatpak version "/flatpak-" version ".tar.xz")) (sha256 (base32 "05lkpbjiwp69q924i1jfyk5frcqbdbv9kyzbqwm2hy723i9jmdbd")) - (patches (search-patches "flatpak-fix-path.patch")))) + (patches + (search-patches "flatpak-fix-path.patch" + "flatpak-unset-gdk-pixbuf-for-sandbox.patch")))) ;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to ;; find the TLS backend in glib-networking. diff --git a/gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch b/gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch new file mode 100644 index 0000000000..79fec8e526 --- /dev/null +++ b/gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch @@ -0,0 +1,19 @@ +Most Guix system setup with desktop evironment will install GDK_PIXBUF_MODULE_FILE +environment variable in the system profile, and it'll be leaked into the sandbox +environment of flatpak, so the applications in sandbox may fail to find correct +GdkPixbuf loaders. + +This patch unset the GDK_PIXBUF_MODULE_FILE environment variable before running +the sandboxed applications, prevents it to load GdkPixbuf loaders from the path +of host system. + +--- a/common/flatpak-run.c ++++ b/common/flatpak-run.c +@@ -1853,6 +1853,7 @@ static const ExportData default_exports[] = { + {"GST_PTP_HELPER", NULL}, + {"GST_PTP_HELPER_1_0", NULL}, + {"GST_INSTALL_PLUGINS_HELPER", NULL}, ++ {"GDK_PIXBUF_MODULE_FILE", NULL}, + }; + + static const ExportData no_ld_so_cache_exports[] = { -- 2.35.1 --=-=-= Content-Type: text/plain -- Retrieve my PGP public key: gpg --recv-keys D47A9C8B2AE3905B563D9135BE42B352A9F6821F Zihao --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Thu Apr 28 10:55:30 2022 Received: (at 55072-done) by debbugs.gnu.org; 28 Apr 2022 14:55:30 +0000 Received: from localhost ([127.0.0.1]:49589 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1nk5YI-0003yu-3t for submit@debbugs.gnu.org; Thu, 28 Apr 2022 10:55:30 -0400 Received: from eggs.gnu.org ([209.51.188.92]:59356) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1nk5YF-0003yb-Ry; Thu, 28 Apr 2022 10:55:28 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:53172) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nk5YA-0000u0-Cs; Thu, 28 Apr 2022 10:55:22 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=yFZuh/glf/jjy6AZ3ZuQ66XzI/kCV+8z7CTW6KVX8lg=; b=W0ltIzQrohc3qAEmsHz2 9raQh//v6Id++0HEOzg887Q7ug8NiQPwgR046SQcxJfIrfQeMlgPlb7CG0hL2y7zX1S9hpoHfLsBp /XDCm9iDHbRmF3IRo6BCcC0hx51Tfllww7WFO2IJUC3fBoEnJOi1XHyHdf7LepnuwoDL6Jss5KzRN YpGY7AkH2cyZ4bUnRfvW9r0u0U1fa55Ya1ojQi5qNTp08b1BcH4Z5vRy0xpvVxZnPNoTh965Sk+Ih TFHd/N6jgfDmaQmy3FWcrKxIOXuIWl+N0Bti184D82sWqpRPoRxVMr9vwqA0ff+uOTcEIZVvh99EF hof4U+pZaTBToQ==; Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=48968 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nk5Y9-0004Gs-Ub; Thu, 28 Apr 2022 10:55:22 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: Zhu Zihao Subject: Re: bug#55072: [PATCH]: Do not leak GDK_PIXBUF_MODULE_FILE into the sandbox. References: <86ilr0o6t4.fsf@163.com> Date: Thu, 28 Apr 2022 16:55:19 +0200 In-Reply-To: <86ilr0o6t4.fsf@163.com> (Zhu Zihao's message of "Sat, 23 Apr 2022 10:45:47 +0800") Message-ID: <87a6c5cl60.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 55072-done Cc: 55072-done@debbugs.gnu.org, 54784-done@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, Zhu Zihao skribis: >>>From affd34d0f0bf6bf04110b595ce77ed8e9448b2c7 Mon Sep 17 00:00:00 2001 > From: Zhu Zihao > Date: Thu, 21 Apr 2022 18:48:51 +0800 > Subject: [PATCH 1/3] gnu: bubblewrap: Update to 0.6.1. > > * gnu/packages/virtualization.scm (bubblewrap): Update to 0.6.1. Applied to the =E2=80=98staging=E2=80=99 branch, due to the high number of = rebuilds. >>>From 3432b64e34d5df329c31b1a09f476ff01a743245 Mon Sep 17 00:00:00 2001 > From: Zhu Zihao > Date: Thu, 21 Apr 2022 18:52:21 +0800 > Subject: [PATCH 2/3] gnu: flatpak: Use G-expressions. > > * gnu/packages/package-management.scm (flatpak): Fix indentation. > [arguments]: Use G-expressions. [...] >>>From 5f1369f8731cc1b35c3c80aac6ad7ebd89d3cb10 Mon Sep 17 00:00:00 2001 > From: Zhu Zihao > Date: Sat, 23 Apr 2022 10:39:32 +0800 > Subject: [PATCH 3/3] gnu: flatpak: Do not leak GDK_PIXBUF_MODULE_FILE int= o the > sandbox. > > Fixes https://issues.guix.gnu.org/54784. > > * gnu/packages/patches/flatpak-unset-gdk-pixbuf-for-sandbox.patch: New fi= le. > * gnu/local.mk (dist_patch_DATA): Add corresponding entry. > * gnu/packages/package-management.scm (flatpak)[source]: Use patch. Applied to =E2=80=98master=E2=80=99. Thanks! Ludo=E2=80=99. From unknown Sun Jun 15 08:30:15 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Fri, 27 May 2022 11:24:06 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator