Flatpak is vulnerable to privilege escalation. This is possible due to the use of a proxy process xdg-dbus-proxy
, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses.
www.openwall.com/lists/oss-security/2021/10/26/9
github.com/flatpak/flatpak/commit/1330662f33a55e88bfe18e76de28b7922d91a999
github.com/flatpak/flatpak/commit/26b12484eb8a6219b9e7aa287b298a894b2f34ca
github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf
github.com/flatpak/flatpak/commit/4c34815784e9ffda5733225c7d95824f96375e36
github.com/flatpak/flatpak/commit/89ae9fe74c6d445bb1b3a40e568d77cf5de47e48
github.com/flatpak/flatpak/commit/9766ee05b1425db397d2cf23afd24c7f6146a69f
github.com/flatpak/flatpak/commit/a10f52a7565c549612c92b8e736a6698a53db330
github.com/flatpak/flatpak/commit/e26ac7586c392b5eb35ff4609fe232c52523b2cf
github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
lists.fedoraproject.org/archives/list/[email protected]/message/R5656ONDP2MGKIJMKEC7N2NXCV27WGTC/
lists.fedoraproject.org/archives/list/[email protected]/message/T5DKCYRC6MFSTFCUP4DELCOUUP3SFEFX/
security-tracker.debian.org/tracker/CVE-2021-41133
www.debian.org/security/2021/dsa-4984