Package: bubblewrap
Version: 0.3.1-2
Tags: security

Is /run/user/<UID>/.bubblewrap/ doesn't exist and couldn't be created (as was the case on my system), bubblewrap falls back to /tmp/.bubblewrap-<UID>/. Local attacker could exploit this to prevent other users from running bubblewrap, for example:

  getent passwd | cut -d: -f3 | xargs printf '/tmp/.bubblewrap-%d\n' | xargs 
touch

But it gets worse, because bubblewrap is happy to use existing /tmp/.bubblewrap-<UID>/, even when the directory is owned by some else. In the worst case, this could be exploited by a local user to execute arbitrary code in the container. (Though I couldn't find any way to exploit this without disabling protected_symlinks.)

--
Jakub Wilk

_______________________________________________
Pkg-utopia-maintainers mailing list
Pkg-utopia-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-utopia-maintainers

Reply via email to