CVE-2023-28101
Published on: Not Yet Published
Last Modified on: 03/22/2023 07:02:00 PM UTC
Certain versions of Flatpak from Flatpak contain the following vulnerability:
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust.
- CVE-2023-28101 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
flatpak - flatpak version = < 1.10.8
- Affected Vendor/Software:
flatpak - flatpak version = >= 1.12.0, < 1.12.8
- Affected Vendor/Software:
flatpak - flatpak version = >= 1.14.0, < 1.14.4
- Affected Vendor/Software:
flatpak - flatpak version = >= 1.15.0, < 1.15.4
CVSS3 Score: 4.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Reject paths given to --filesystem/--persist with special characters · flatpak/[email protected] · GitHub | github.com text/html |
![]() |
CVE-2023-28101: Metadata with ANSI control codes can cause misleading terminal output · Advisory · flatpak/flatpak · GitHub | github.com text/html |
![]() |
cli-transaction: Escape any special characters in the EOL reason · flatpak/[email protected] · GitHub | github.com text/html |
![]() |
Ensure special characters in permissions and metadata are escaped · flatpak/[email protected] · GitHub | github.com text/html |
![]() |
Related QID Numbers
- 283814 Fedora Security Update for flatpak (FEDORA-2023-b0717d8c45)
- 283849 Fedora Security Update for flatpak (FEDORA-2023-9fbc701e0d)
- 753858 SUSE Enterprise Linux Security Update for flatpak (SUSE-SU-2023:1714-1)
- 753859 SUSE Enterprise Linux Security Update for flatpak (SUSE-SU-2023:1713-1)
- 753883 SUSE Enterprise Linux Security Update for flatpak (SUSE-SU-2023:1712-1)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Flatpak | Flatpak | All | All | All | All |
- cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-28101 : Flatpak is a system for building, distributing, and running sandboxed desktop applications on… twitter.com/i/web/status/1… | 2023-03-16 16:01:34 |
![]() |
One issue (CVE-2023-28101) involves maliciously crafted metadata hiding permissions using special characters and th… twitter.com/i/web/status/1… | 2023-03-16 19:22:41 |
![]() |
CVE-2023-28101 | 2023-03-16 16:38:39 |