Description
Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.
Problem types
CWE-61: UNIX Symbolic Link (Symlink) Following
Product status
References
www.openwall.com/lists/oss-security/2026/04/09/8
www.openwall.com/lists/oss-security/2026/04/10/14
github.com/...latpak/security/advisories/GHSA-cc2q-qc34-jprg