Debian Patches

Status for flatpak/1.17.3-2

Patch Description Author Forwarded Bugs Origin Last update
debian/system-helper-Set-Debian-s-canonical-home-directory-for-s.patch system-helper: Set Debian's canonical home directory for system users Simon McVittie <smcv@debian.org> not-needed 2025-03-10
CVE-2026-34078/Update-subtree-libglnx-2026-04-07.patch Update subtree: libglnx 2026-04-07
* fdio: Avoid relying on VLAs or gcc-specific constant-folding
* errors: Fix URL to an old libgsystem commit
* lockfile: Assert non-null path in make_lock_file for analyzers
* backports: Add g_clear_fd
* glnx-errors.h: add glnx_fd_throw[_*] variants
* fdio: Add glnx_fd_reopen
* local-alloc: Remove duplicate definition of glnx_unref_object
* fdio: Add glnx_statx
* chase: Add glnx_chaseat which functions similar to openat2
* chase: Add glnx_chase_and_statxat
Simon McVittie <smcv@collabora.com> yes upstream upstream, 1.17.4, commit:1293a6441bf0f8522f73727ff9e9872be6b43f03 2026-04-07
CVE-2026-34078/flatpak-bwrap-Add-dup-ing-variant-flatpak_bwrap_add_args_.patch flatpak-bwrap: Add dup-ing variant flatpak_bwrap_add_args_data_fd_dup Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:2acdd330d8aa11c6f2fab5467e038bec29c2474e 2026-02-06
CVE-2026-34078/utils-Add-flatpak_parse_fd.patch utils: Add flatpak_parse_fd
This is meant to parse file descriptor strings passed via the command
line. It is not a security mechanism and will happily accept fds 0-3 as
well.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:50af610ff417dfd66b9c8d7b7846698808a3abd8 2026-02-06
CVE-2026-34078/flatpak-bwrap-Use-glnx_close_fd-as-clear-func.patch flatpak-bwrap: Use glnx_close_fd as clear func
We already have a function which clears a fd that a pointer points to,
so let's use it instead of duplicating the code.

Will become useful in a later commit as well.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:aab3f42374634518fdd0d71ab2369bb7557f34d1 2026-02-06
CVE-2026-34078/run-Use-O_PATH-fds-for-the-runtime-and-app-deploy-directo.patch run: Use O_PATH fds for the runtime and app deploy directories
This also allows us to use glnx_chaseat, and other at-functions to
traverse the filesystem tree in a safe way.

This is important because the app and runtime deploy directories can be
under an attackers control. The flatpak portal for example allows
sandboxed apps to provide them.

In particular, attacks where the deploy dirs get replaced by a symlink
pointing into the host system will be stopped by this.

Note that this change alone is not enough to avoid the attack, and the
portal has to be changed as well.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:ac62ebe3080401501efb47044981d2b519629186 2026-02-06
CVE-2026-34078/run-Add-usr-fd-and-app-fd-options.patch run: Add --usr-fd and --app-fd options
Exposes options to pass in a fd for the runtime and app deploy. The
flatpak portal will make use of this in a following commit.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:1b5e886d7f22f2ee81c2149c04e915bf4cabe518 2026-02-06
CVE-2026-34078/run-Add-ro-bind-fds-to-flatpak_run_app.patch run: Add (ro-)bind fds to flatpak_run_app
The flatpak portal allows apps to expose files and folders from within
the sandbox to a side-sandbox using flatpak-spawn. So far it has used
the --filesystem option to mount those files and folders, but it takes a
path. Paths are inherently racy and they allow the app to swap out any
component of the path with a symlink after handing it off. If they win
the race, flatpak will mount a completely different directory.

This adds a new way to mount files and directories based on O_PATH
file descriptor that needs to provided when execing the flatpak binary.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:2ed87aff36bb162434a5c8e926396b5121b5e183 2026-02-06
CVE-2026-34078/run-Add-ro-bind-fd-options.patch run: Add --(ro-)bind-fd options
Exposes the functionality added to flatpak_run_app in the previous
commit with two new options.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:b5ae89ed332e0f0c9f642bbdddb7c3cbd2f6fae6 2026-02-06
CVE-2026-34078/portal-Use-bind-fd-app-fd-and-usr-fd-options-to-avoid-rac.patch portal: Use --bind-fd, --app-fd and --usr-fd options to avoid races
Now that flatpak_run_app accepts fds for app and runtime deploy, as well
as bind and ro-bind fds, and flatpak-run exposes the functionality, we
can finally hook this all up to the flatpak portal!
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:3c500145fd4c056a41d36f32138ae61735898087 2026-02-06
CVE-2026-34079/utils-Only-remove-cached-files-in-the-cache-directory.patch utils: Only remove cached files in the cache directory
The function flatpak_switch_symlink_and_remove is used to implement a
cache for ld.so (regenerate_ld_cache). If the active symlink changes to
a new cache file, the old cache file is supposed to get removed.

The symlink still points to the old cache file, so we would remove the
file that it points to and then point at the new file.

Because the symlink is under the app's control, the symlink can point
anywhere, and the removal happens in the host context, which allows an
app to remove arbitrary files on the host.

The filename of the cache files are checksums, which means that we can
ensure that the link is a file in the same directory of the link by
checking that it only contains the chars a-zA-Z0-9.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:c94b780e58fd3a6d92a9e7e145dac7a1f5e40d92 2026-01-09
GHSA-2fxp-43j9-pwvc/utils-Do-not-follow-symlinks-in-flatpak_open_file_at.patch utils: Do not follow symlinks in flatpak_open_file_at
We use flatpak_open_file_at in the context of the system helper to open
files written by a user. This means that we want to prevent DOS and
exposing files which only the system helper has access to.

To prevent DOS and avoid side-effects, the file is opened with
O_NONBLOCK and O_NOCTTY.

To prevent leaking files, the file is supposed to not open symlinks.
This part, we failed at. We check if the opened file is a regular file,
but what we actually checked is, if the file a symlink might point at is
a regular file.

Fix this by also specifying O_NOFOLLOW in openat.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:3c111d9e19267dad63bf006647c1d44861a7fec5 2026-01-12
GHSA-89xm-3m96-w3jg/system-helper-Only-remove-an-ongoing-pull-if-users-match.patch system-helper: Only remove an ongoing pull if users match
The code would always remove a pull from the hashtable, and then check if the
users match and abort if they don't. Either way, the pull gets dropped.

Fix this by only removing the pull if the dir and the user match.
Sebastian Wick <sebastian.wick@redhat.com> yes upstream upstream, 1.17.4, commit:f1bdc6aeae91f7171d1529f40267acc78825231d 2026-02-07

All known versions for source package 'flatpak'

Links