Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0954

NIXPKGS-2026-0954
published on
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    7 packages
    • mpc-qt
    • flatpak-builder
    • flatpak-xdg-utils
    • libsForQt5.flatpak-kcm
    • kdePackages.flatpak-kcm
    • plasma5Packages.flatpak-kcm
    • haskellPackages.cabal-flatpak
  • @LeSuisse deleted maintainer @getchoo maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Flatpak has a complete sandbox escape leading to host file access and code execution in the host context

Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.

Affected products

flatpak
  • ==< 1.16.4

Matching in nixpkgs

pkgs.flatpak

Linux application sandboxing and distribution framework

Ignored packages (7)

Package maintainers

Ignored maintainers (1)