Back to bug 2179219
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2023-03-17 05:02:14 UTC | Blocks | 2179174 | |
| Sandipan Roy | 2023-03-17 05:06:59 UTC | Depends On | 2179224, 2179223 | |
| Sandipan Roy | 2023-03-21 06:57:19 UTC | Depends On | 2180312, 2180311 | |
| Sandipan Roy | 2023-03-22 04:04:40 UTC | Doc Text | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. So, in Flatpak if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. | |
| RaTasha Tillery-Smith | 2023-03-22 11:35:05 UTC | Doc Text | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. So, in Flatpak if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. | A flaw was found in Flatpak, a system for building, distributing, and running sandboxed desktop applications on Linux. Suppose an attacker publishes a Flatpak app with elevated permissions. In that case, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC.` |
| Red Hat Bugzilla | 2023-07-07 08:34:09 UTC | Assignee | security-response-team | nobody |
Back to bug 2179219