Simon McVittie discovered that flatpak-portal service allowed sandboxed applications to execute arbitrary code on the host system (a sandbox escape). A malicious user could create a Flatpak application that set environment variables, trusted by the Flatpak "run" command, and use it to execute arbitrary code outside the sandbox.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "flatpak", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "flatpak-dbgsym", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "flatpak-tests", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "flatpak-tests-dbgsym", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "gir1.2-flatpak-1.0", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "libflatpak-dev", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "libflatpak-doc", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "libflatpak0", "binary_version": "1.0.9-0ubuntu0.2" }, { "binary_name": "libflatpak0-dbgsym", "binary_version": "1.0.9-0ubuntu0.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "flatpak", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "flatpak-dbgsym", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "flatpak-tests", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "flatpak-tests-dbgsym", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "gir1.2-flatpak-1.0", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "libflatpak-dev", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "libflatpak-doc", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "libflatpak0", "binary_version": "1.6.5-0ubuntu0.2" }, { "binary_name": "libflatpak0-dbgsym", "binary_version": "1.6.5-0ubuntu0.2" } ] }