|
|
Message-ID: <admDB8Eiz6MGYYu0@definition.pseudorandom.co.uk> Date: Sat, 11 Apr 2026 00:08:55 +0100 From: Simon McVittie <smcv@...ian.org> To: oss-security@...ts.openwall.com Subject: xdg-desktop-portal GHSA-rqr9-jwwf-wxgj: Trashing of arbitrary host files xdg-desktop-portal's Trash portal is designed to allow sandboxed apps to ask for a file or directory accessible to the app to be moved to the trash. Similar to CVE-2026-34078 in Flatpak (but less serious), Codean Labs reported that a malicious or compromised Flatpak app could ask the portal to trash a file that it owns, then replace that file with a symlink, exploit a time-of-check/time-of-use mismatch and make the portal trash the target of the symlink on the host system instead. This is fixed in stable release 1.20.4 and development prerelease 1.21.1. https://github.com/flatpak/xdg-desktop-portal/security/advisories/GHSA-rqr9-jwwf-wxgj
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.