It was discovered that Flatpak incorrectly handled certain AF_UNIX sockets. An attacker could use this to specially craft a Flatpak application that could escape sandbox confinement.
{ "binaries": [ { "binary_name": "flatpak", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "flatpak-dbgsym", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "flatpak-tests", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "flatpak-tests-dbgsym", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "gir1.2-flatpak-1.0", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "libflatpak-dev", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "libflatpak-doc", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "libflatpak0", "binary_version": "1.0.9-0ubuntu0.4" }, { "binary_name": "libflatpak0-dbgsym", "binary_version": "1.0.9-0ubuntu0.4" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "flatpak", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "flatpak-dbgsym", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "flatpak-tests", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "flatpak-tests-dbgsym", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "gir1.2-flatpak-1.0", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "libflatpak-dev", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "libflatpak-doc", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "libflatpak0", "binary_version": "1.6.5-0ubuntu0.4" }, { "binary_name": "libflatpak0-dbgsym", "binary_version": "1.6.5-0ubuntu0.4" } ], "availability": "No subscription required" }