First published: Thu Mar 16 2023(Updated: )
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Flatpak Flatpak | <1.10.8 | |
Flatpak Flatpak | >=1.12.0<1.12.8 | |
Flatpak Flatpak | >=1.14.0<1.14.4 | |
Flatpak Flatpak | >=1.15.0<1.15.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28101 is a vulnerability in Flatpak, a system for building, distributing, and running sandboxed desktop applications on Linux.
The severity of CVE-2023-28101 is medium with a CVSS score of 4.3.
CVE-2023-28101 affects Flatpak versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4.
An attacker can exploit CVE-2023-28101 by publishing a Flatpak app with elevated permissions and hiding those permissions from users of the flatpak(1) command-line tool.
Yes, the fixes for CVE-2023-28101 are available in Flatpak versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4.