Package: flatpak
Version: 0.11.4-1
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: Debian Security Team <[email protected]>

Flatpak older than 1.16.4 has a complete sandbox escape which leads to
host file access and code execution in the host context 
(CVE-2026-34078). I believe all versions since 0.11.4, which added 
flatpak-portal, are vulnerable.

A malicious or compromised Flatpak app could exploit this to achieve 
arbitrary code execution on the host.

For testing/unstable, I am about to upload the new upstream release 
1.16.4. This fixes CVE-2026-34078 and some other, less serious security 
issues for which I will report separate bugs.

For trixie, I would like to address this by uploading the new upstream 
release to trixie-security. It would be easiest to do this if the 
security team will allow uploading a backport of 1.16.4 from unstable, 
reverting packaging changes that aren't appropriate. I previously did 
non-security uploads of Flatpak 1.16.2 and 1.16.3 to trixie in this way, 
with the release team's approval. I'll prepare a debdiff shortly.

For bookworm, because upstream no longer supports 1.14.x, it will be 
necessary to backport the upstream changes, which is unfortunately 
rather involved. I've been preparing this under embargo, but I would 
appreciate it if the security team could either review the backport, or 
take over responsibility for this release.

Thanks,
    smcv

Reply via email to