DEBIAN-CVE-2026-34079

Source
https://security-tracker.debian.org/tracker/CVE-2026-34079
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34079.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-34079
Upstream
Published
2026-04-07T22:16:22.080Z
Modified
2026-04-08T09:02:22.940904Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the caching for ld.so removes outdated cache files without properly checking that the app controlled path to the outdated cache is in the cache directory. This allows Flatpak apps to delete arbitrary files on the host. This vulnerability is fixed in 1.16.4.

References

Affected packages

Debian:11 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.10.2-3
1.10.3-0+deb11u1~bpo11+1
1.10.3-0+deb11u1
1.10.5-0+deb11u1~bpo10+1
1.10.5-0+deb11u1
1.10.7-0+deb11u1~bpo10+1
1.10.7-0+deb11u1
1.10.8-0+deb11u1
1.10.8-0+deb11u2
1.10.8-0+deb11u3
1.11~git20210413-1
1.11~git20210416.1-1
1.11.1-1
1.11.2-1
1.11.3-1
1.11.3-2
1.12.0-1
1.12.1-1~bpo11+1
1.12.1-1
1.12.2-1~bpo11+1
1.12.2-1
1.12.2-2
1.12.3-1~bpo11+1
1.12.3-1
1.12.4-1~bpo11+1
1.12.4-1
1.12.5-1~bpo11+1
1.12.5-1
1.12.6-1~bpo11+1
1.12.6-1
1.12.7-1~bpo11+1
1.12.7-1
1.13.1-1
1.13.2-1
1.13.3-1
1.13.3-2
1.14.0-1~bpo11+1
1.14.0-1
1.14.0-2~bpo11+1
1.14.0-2
1.14.1-1~bpo11+1
1.14.1-1
1.14.2-1~bpo11+1
1.14.2-1
1.14.3-1~bpo11+1
1.14.3-1
1.14.4-1~bpo11+1
1.14.4-1
1.14.4-2
1.14.5-1
1.14.6-1~deb13u1
1.14.6-1
1.14.8-1~deb12u1
1.14.8-1
1.14.10-1~deb12u1
1.14.10-1
1.15.0-1
1.15.0-2
1.15.1-1
1.15.2-1
1.15.3-1
1.15.4-1
1.15.6-1
1.15.7-1
1.15.8-1
1.15.9-1
1.15.10-1
1.15.12-1
1.15.91-1
1.16.0-1
1.16.0-2~bpo12+1
1.16.0-2
1.16.1-1~bpo12+1
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34079.json"

Debian:12 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.14.4-1
1.14.4-1+deb12u1~bpo11+1
1.14.4-1+deb12u1
1.14.4-2
1.14.5-1
1.14.6-1~deb13u1
1.14.6-1
1.14.8-1~deb12u1
1.14.8-1
1.14.10-1~deb12u1
1.14.10-1
1.15.0-1
1.15.0-2
1.15.1-1
1.15.2-1
1.15.3-1
1.15.4-1
1.15.6-1
1.15.7-1
1.15.8-1
1.15.9-1
1.15.10-1
1.15.12-1
1.15.91-1
1.16.0-1
1.16.0-2~bpo12+1
1.16.0-2
1.16.1-1~bpo12+1
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34079.json"

Debian:13 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34079.json"

Debian:14 / flatpak

Package

Name
flatpak
Purl
pkg:deb/debian/flatpak?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.1-1
1.16.1-2
1.16.1-3
1.16.2-1~deb13u1
1.16.2-1
1.16.3-1~deb13u1
1.16.3-1
1.16.4-1
1.17.2-1
1.17.3-1
1.17.3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34079.json"