{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiajsibhvdocfqbzvkgegefqsm6fxnlymh5bgmqhfj2wo3nleffvpq",
"uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mj2jj4hcvw22"
},
"path": "/t/cve-2026-34078-flatpak-complete-sandbox-escape-leading-to-host-file-access-and-code-execution-in-the-host-context/36994#post_1",
"publishedAt": "2026-04-09T09:00:10.000Z",
"site": "https://discuss.privacyguides.net",
"tags": [
"GitHub",
"CVE-2026-34078: Complete sandbox escape leading to host file access and code..."
],
"textContent": "GitHub\n\n### CVE-2026-34078: Complete sandbox escape leading to host file access and code...\n\n### Impact Every Flatpak app is able to read and write arbitrary files on the host and execute code in the host context. ### Description The Flatpak portal accepts paths in the `sandbox-expose...",
"title": "CVE-2026-34078: Flatpak Complete sandbox escape leading to host file access and code execution in the host context"
}