DEBIAN-CVE-2026-34078

Source
https://security-tracker.debian.org/tracker/CVE-2026-34078
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34078.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-34078
Upstream
Published
2026-04-07T22:16:21.930Z
Modified
2026-04-08T09:01:09.979252Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.

References

Affected packages

Debian:11 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.10.2-3
1.10.3-0+deb11u1~bpo11+1
1.10.3-0+deb11u1
1.10.5-0+deb11u1~bpo10+1
1.10.5-0+deb11u1
1.10.7-0+deb11u1~bpo10+1
1.10.7-0+deb11u1
1.10.8-0+deb11u1
1.10.8-0+deb11u2
1.10.8-0+deb11u3
1.11~git20210413-1
1.11~git20210416.1-1
1.11.1-1
1.11.2-1
1.11.3-1
1.11.3-2
1.12.0-1
1.12.1-1~bpo11+1
1.12.1-1
1.12.2-1~bpo11+1
1.12.2-1
1.12.2-2
1.12.3-1~bpo11+1
1.12.3-1
1.12.4-1~bpo11+1
1.12.4-1
1.12.5-1~bpo11+1
1.12.5-1
1.12.6-1~bpo11+1
1.12.6-1
1.12.7-1~bpo11+1
1.12.7-1
1.13.1-1
1.13.2-1
1.13.3-1
1.13.3-2
1.14.0-1~bpo11+1
1.14.0-1
1.14.0-2~bpo11+1
1.14.0-2
1.14.1-1~bpo11+1
1.14.1-1
1.14.2-1~bpo11+1
1.14.2-1
1.14.3-1~bpo11+1
1.14.3-1
1.14.4-1~bpo11+1
1.14.4-1
1.14.4-2
1.14.5-1
1.14.6-1~deb13u1
1.14.6-1
1.14.8-1~deb12u1
1.14.8-1
1.14.10-1~deb12u1
1.14.10-1
1.15.0-1
1.15.0-2
1.15.1-1
1.15.2-1
1.15.3-1
1.15.4-1
1.15.6-1
1.15.7-1
1.15.8-1
1.15.9-1
1.15.10-1
1.15.12-1
1.15.91-1
1.16.0-1
1.16.0-2~bpo12+1
1.16.0-2
1.16.1-1~bpo12+1
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34078.json"

Debian:12 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.14.4-1
1.14.4-1+deb12u1~bpo11+1
1.14.4-1+deb12u1
1.14.4-2
1.14.5-1
1.14.6-1~deb13u1
1.14.6-1
1.14.8-1~deb12u1
1.14.8-1
1.14.10-1~deb12u1
1.14.10-1
1.15.0-1
1.15.0-2
1.15.1-1
1.15.2-1
1.15.3-1
1.15.4-1
1.15.6-1
1.15.7-1
1.15.8-1
1.15.9-1
1.15.10-1
1.15.12-1
1.15.91-1
1.16.0-1
1.16.0-2~bpo12+1
1.16.0-2
1.16.1-1~bpo12+1
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34078.json"

Debian:13 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34078.json"

Debian:14 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34078.json"