First published: Mon Feb 13 2017(Updated: )
Bubblewrap before 0.1.3 sets the PR_SET_DUMPABLE flag, which might allow local users to gain privileges by attaching to the process, as demonstrated by sending commands to a PrivSep socket.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Bubblewrap | <=0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8659 is classified as a medium severity vulnerability.
To fix CVE-2016-8659, you should upgrade Bubblewrap to version 0.1.3 or later.
Local users with access to the affected versions of Bubblewrap are at risk from CVE-2016-8659.
CVE-2016-8659 allows local users to gain privileges by attaching to the process, compromising system security.
Yes, CVE-2016-8659 is demonstrated by sending commands to a PrivSep socket, which can lead to privilege escalation.