Package: xdg-desktop-portal
Version: 1.20.3+ds-3
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: Debian Security Team <[email protected]>
Forwarded: 
https://github.com/flatpak/xdg-desktop-portal/security/advisories/GHSA-rqr9-jwwf-wxgj

xdg-desktop-portal's Trash portal allows sandboxed apps to ask for a 
file or directory to be moved to the trash. Similar to CVE-2026-34078 in 
Flatpak, a malicious or compromised Flatpak app could ask the portal to 
trash a file that it owns, then replace that file with a symlink in an 
attempt to cause the portal to trash the target of the symlink on the 
host system. I'm not sure what the severity of this would be considered 
to be, so I've reported it as RC for now, but please downgrade if RC is 
considered excessive.

Currently no CVE ID has been allocated for this. I don't know whether 
upstream plans to request one.

For testing/unstable, I'm preparing an upload of 1.20.4 now.

For trixie, I think the easiest way to fix the vulnerability will be to 
backport 1.20.4 from testing/unstable, reverting any of the packaging 
changes in 1.20.3+ds-2 and 1.20.3+ds-3 that are felt to be inappropriate 
for a stable update. There are no changes between 1.20.3 and 1.20.4 
other than those required to fix the vulnerability, but it adds a 
"copylib" subproject (libglnx, the same one used in Flatpak) to 
implement safe symlink traversal, so the diff is large.

For bookworm, it'll have to be a backport of individual changes. I 
suggest prioritizing trixie > bookworm and flatpak > xdg-desktop-portal.

experimental will remain vulnerable until 1.21.1 is released, or until I 
get a chance to convert the changes into patches, whichever is first. 
I'm hoping that 1.21.1 will be released today.

    smcv

Reply via email to