{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiajsibhvdocfqbzvkgegefqsm6fxnlymh5bgmqhfj2wo3nleffvpq",
    "uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mj2jj4hcvw22"
  },
  "path": "/t/cve-2026-34078-flatpak-complete-sandbox-escape-leading-to-host-file-access-and-code-execution-in-the-host-context/36994#post_1",
  "publishedAt": "2026-04-09T09:00:10.000Z",
  "site": "https://discuss.privacyguides.net",
  "tags": [
    "GitHub",
    "CVE-2026-34078: Complete sandbox escape leading to host file access and code..."
  ],
  "textContent": "GitHub\n\n### CVE-2026-34078: Complete sandbox escape leading to host file access and code...\n\n### Impact Every Flatpak app is able to read and write arbitrary files on the host and execute code in the host context. ### Description The Flatpak portal accepts paths in the `sandbox-expose...",
  "title": "CVE-2026-34078: Flatpak Complete sandbox escape leading to host file access and code execution in the host context"
}