First published: Mon Jan 09 2017(Updated: )
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850702">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850702</a> Upstream bugs: <a href="https://github.com/projectatomic/bubblewrap/issues/142">https://github.com/projectatomic/bubblewrap/issues/142</a> <a href="https://github.com/projectatomic/bubblewrap/pull/143">https://github.com/projectatomic/bubblewrap/pull/143</a> Upstream patch: <a href="https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117">https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bubblewrap | <0.1.5 | 0.1.5 |
debian/bubblewrap | 0.4.1-3 0.8.0-2 0.9.0-1 | |
Project Atomic Bubblewrap | <=0.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5226 is considered a high-severity vulnerability due to the risk of sandbox escape.
CVE-2017-5226 allows an attacker to escape the sandbox by using the TIOCSTI ioctl to push characters into the terminal's input buffer.
CVE-2017-5226 affects bubblewrap versions up to and including 0.1.5.
To fix CVE-2017-5226, upgrade bubblewrap to version 0.4.1-3 or later.
CVE-2017-5226 impacts systems using bubblewrap versions prior to 0.4.1-3, particularly on Debian-based and Red Hat-based distributions.