Projectatomic Bubblewrap vulnerabilities
3 known vulnerabilities affecting projectatomic/bubblewrap.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2
Vulnerabilities
Page 1 of 1
CVE-2020-5291HIGHCVSS 7.8fixed in 0.4.12020-03-31
CVE-2020-5291 [HIGH] CWE-648 CVE-2020-5291: Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivi
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that this only affects the combination of bubblewrap in set
nvd
CVE-2019-12439HIGHCVSS 7.8fixed in 0.3.32019-05-29
CVE-2019-12439 [HIGH] CWE-20 CVE-2019-12439: bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In s
bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
nvd
CVE-2017-5226CRITICALCVSS 10.0≤ 0.1.52017-03-29
CVE-2017-5226 [CRITICAL] CWE-20 CVE-2017-5226: When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent se
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
nvd