Security News Flatpak 1.16.4 Fixes Critical Sandbox Escape Vulnerability

lokamoka820

Level 43
Thread author
Verified
Top Poster
Well-known
Mar 1, 2024
3,286
3
10,828
4,169
Banana Republic
The most serious issue, CVE-2026-34078, could allow host file access and code execution from within the sandbox. Flatpak 1.16.4 also resolves CVE-2026-34079, which could result in arbitrary file deletion on the host filesystem.

Additionally, the update addresses a flaw that could allow an attacker to read certain files on the host through Flatpak’s system helper and fixes a flaw in which one user could break tracking for another user’s ongoing app download, leaving it running without a proper way to stop it.
 
This means the update is important, especially on systems that rely heavily on Flatpak sandboxing.

From the text you quoted:

  • CVE-2026-34078 is described as the most serious issue because it could allow access to host files and possible code execution from inside the sandbox.
  • CVE-2026-34079 could allow arbitrary file deletion on the host filesystem.
  • The other fixes appear to cover unintended file access through Flatpak’s system helper and a user-isolation issue affecting app download tracking.

Why it matters

Flatpak’s main security benefit is isolation between the app and the host system. If a flaw allows sandbox escape, host file access, or host-side file deletion, that weakens one of Flatpak’s core protections.

In practical terms, the risk depends on factors such as:

  • Whether a malicious or compromised Flatpak app is installed
  • How the vulnerable code path is exposed
  • The Flatpak version currently in use
  • Distribution-specific backports or downstream patches

So the wording sounds serious, but the actual exposure on a given system depends on the installed version and whether the distro has already patched it.

Reasonable next steps

  • Update Flatpak to 1.16.4 or whatever patched package your Linux distribution provides
  • Install all pending system updates, not just Flatpak itself
  • Avoid adding untrusted Flatpak remotes or apps while waiting to update
  • Check your distribution’s security advisory to confirm the fixed package version

Bottom line

If that quoted advisory is accurate, it is not something to ignore. It points to sandbox-related vulnerabilities with potential host impact, so applying the patched Flatpak release or your distro’s security update is the correct response.
 
  • Like
Reactions: Sorrento
UPDATE 1:
Update 08.04.26: Flatpak 1.16.5 is out now to fix regressions caused by the sandbox escape security fix, which impacts some web browsers, browser-based apps, and the Steam Client!
UPDATE 2:
Update 10.04.26: Flatpak 1.16.6 is now available to fix more regressions with the Chromium and Epiphany web browsers, and when installing extra-data without a runtime, and a couple of bugs.
Source:
 
It's worth noting that this security vulnerability affects Flatpak, but not the underlying sandbox engine itself (Bubblewrap). Flatpak requires significantly greater complexity and overhead to provide its services. This particular defect came from the high-level logic where Flatpak manages user-defined paths and "portals," and more specifically how the Flatpak portal handles the sandbox-expose options.

Bubblewrap (bwrap), the real security technology underneath, is the minimalist gold standard for unprivileged sandboxing on Linux—additionally taking advantage of Landlock, a powerful Linux Security Module first merged into the stable kernel in 2021. Landlock is a stackable, multidimensional security layer that lets any application tell the kernel, "From now on, you should only let me touch these files, network sockets, hardware or kernel features, etc."

Linux equips you with extreme flexibility building numerous layers of security. All these features are deeply audited and have been engineered over the course of many years. It's pretty cool! Chromium sets up sandboxing differently depending on the OS, which has evolved over time, and it takes advantage of Landlock now for additional security.
 
Last edited:
Debian has fixed the flatpak security issue, so Debian users are recommended to upgrade their systems as soon as possible.