Simon McVittie discovered that flatpak-portal service allowed sandboxed applications to execute arbitrary code on the host system (a sandbox escape). A malicious user could create a Flatpak application that set environment variables, trusted by the Flatpak "run" command, and use it to execute arbitrary code outside the sandbox.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "flatpak" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "flatpak-dbgsym" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "flatpak-tests" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "flatpak-tests-dbgsym" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "gir1.2-flatpak-1.0" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "libflatpak-dev" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "libflatpak-doc" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "libflatpak0" }, { "binary_version": "1.0.9-0ubuntu0.2", "binary_name": "libflatpak0-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "flatpak" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "flatpak-dbgsym" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "flatpak-tests" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "flatpak-tests-dbgsym" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "gir1.2-flatpak-1.0" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "libflatpak-dev" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "libflatpak-doc" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "libflatpak0" }, { "binary_version": "1.6.5-0ubuntu0.2", "binary_name": "libflatpak0-dbgsym" } ] }