Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that they would be executed outside the sandbox after the sandboxed app exits. This fix was incomplete: on 64-bit platforms, the seccomp filter could be bypassed by an ioctl request number that…
P30, P30 Pro, Mate 20 smartphones with software of versions earlier than ELLE-AL00B 22.214.171.124(C00E190R2P1), versions earlier than VOGUE-AL00A 126.96.36.199(C00E190R2P1), versions earlier than Hima-AL00B 188.8.131.52(C00E133R2P1) and HiSuite with versions earlier than HiSuite 184.108.40.2065 have a version downgrade vulnerability. The device and HiSuite software do not validate the upgrade package sufficiently, so that the system of smartphone can be downgraded to an older version.
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.