Vulnerability Description
xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules but fails to handle eavesdrop ='true' (with a space before the equals sign) and similar cases. Clients can intercept D-Bus messages they should not have access to. This vulnerability is fixed in 0.1.7.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Flatpak | Xdg-Dbus-Proxy | < 0.1.7 |
Related Weaknesses (CWE)
References
- https://github.com/flatpak/xdg-dbus-proxy/security/advisories/GHSA-vjp5-hjfm-767Vendor Advisory
- http://www.openwall.com/lists/oss-security/2026/04/10/15Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2026/04/msg00022.html
FAQ
What is CVE-2026-34080?
CVE-2026-34080 is a vulnerability with a CVSS score of 5.5 (MEDIUM). xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules bu...
How severe is CVE-2026-34080?
CVE-2026-34080 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34080?
Check the references section above for vendor advisories and patch information. Affected products include: Flatpak Xdg-Dbus-Proxy.