CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
EPSS
Percentile
13.0%
Flatpak is vulnerable to Arbitrary Code Execution. The vulnerability is due to improper handling of the --command argument to the portal interface org.freedesktop.portal.Background.RequestBackground from within a Flatpak app, which allows malicious or compromised Flatpak apps to pass bwrap arguments such as --bind to execute arbitrary code outside the sandbox.
www.openwall.com/lists/oss-security/2024/04/18/5
github.com/flatpak/flatpak/commit/72016e3fce8fcbeab707daf4f1a02b931fcc004d
github.com/flatpak/flatpak/commit/81abe2a37d363f5099c3d0bdcd0caad6efc5bf97
github.com/flatpak/flatpak/commit/b7c1a558e58aaeb1d007d29529bbb270dc4ff11e
github.com/flatpak/flatpak/commit/bbab7ed1e672356d1a78b422462b210e8e875931
github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj
lists.fedoraproject.org/archives/list/[email protected]/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/
lists.fedoraproject.org/archives/list/[email protected]/message/ZFNSCFJVMAQK5AF55JBN7OSJP3CREDBD/
security-tracker.debian.org/tracker/CVE-2024-32462