Headline
CVE-2023-22970: [Security]: Vulnerability Patched in 51.0 · Issue #2463 · bottlesdevs/Bottles
Bottles before 51.0 mishandles YAML load, which allows remote code execution via a crafted file.
Overview
A security vulnerability has been discovered and addressed in bottlesdevs/Bottles.
Versions 50.2 and earlier are affected.
Please update Bottles to version 51.0 or later.
Am I affected
You may be impacted by malicious activity when processing files that contain a malicious YAML file.
This applies to the average user, who could potentially:
- Importing a malicious bottle archive file
- Creating a bottle using a malicious custom environment recipe
- Loading a malicious local repository
What should I do
- Update to fixed version
- Scan your system if you have ever imported any untrusted file
- If you are using the official flatpak version, the impact of the vulnerability is significantly reduced due to the sandboxing provided by flatpak. However, it is still crucial to update Bottles to the latest version
Technical Detail
The vulnerability arises from multiple potential exploitation vectors related to the YAML load function.
The most probable method of exploitation is through the importation of a carefully crafted YAML file. This file can take the form of an archive tarball, a YAML configuration file, or a custom environment recipe.
Additionally, there is a risk of remote code execution when an attacker gains control over the repository mirror.
CVE
https://www.cve.org/CVERecord?id=CVE-2023-22970