Your message dated Tue, 31 Mar 2020 21:51:41 +0100
with message-id <[email protected]>
and subject line Re: Bug#955441: CVE-2020-5291, GHSA-j2qp-rvxj-43vj: privilege 
escalation in some kernel configurations
has caused the Debian Bug report #955441,
regarding CVE-2020-5291, GHSA-j2qp-rvxj-43vj: privilege escalation in some 
kernel configurations
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
955441: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955441
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: bubblewrap
Version: 0.4.0-1
Severity: critical
Tags: security upstream fixed-upstream
Justification: root security hole

bubblewrap 0.4.0 introduced a privilege escalation vulnerability on systems
where both of these are true:

- unprivileged users can create user namespaces:
    - not true on Debian kernels by default
    - true on Debian kernels if reconfigured
      with /proc/sys/kernel/unprivileged_userns_clone = 1
    - true on upstream kernels (usually)
    - true on Ubuntu kernels (usually)

- /usr/bin/bwrap is setuid root:
    - true with Debian's bubblewrap package
    - not true with Ubuntu's bubblewrap package

Mitigation:

- either disable unprivileged creation of user namespaces:
    - set /proc/sys/kernel/unprivileged_userns_clone to 0, or
    - set /proc/sys/user/max_user_namespaces to 0
- or make /usr/bin/bwrap not be setuid root
    - use dpkg-statoverride or chmod

This is tracked as CVE-2020-5291 and GHSA-j2qp-rvxj-43vj.

The bubblewrap packages in Debian 10 'buster' and older releases are
not vulnerable.

The bubblewrap 0.4.0-1~bpo10+1 package in buster-backports is vulnerable.
This is fixed in 0.4.1-1~bpo10+1.

The bubblewrap 0.4.0-1 package in testing is vulnerable. This is fixed
in 0.4.1-1, currently in unstable.

If you have reconfigured the kernel to allow unprivileged creation of user
namespaces, it is unnecessary for /usr/bin/bwrap to be setuid. A
least-privilege approach is to reconfigure bwrap to have no special
privileges on such systems:

    dpkg-statoverride --update --add root root 0755 /usr/bin/bwrap

However, if you do this, and subsequently reconfigure the kernel to
disallow unprivileged creation of user namespaces, programs like flatpak
will not work. To solve that, it will be necessary to make /usr/bin/bwrap
setuid again, for example:

    dpkg-statoverride --remove /usr/bin/bwrap
    dpkg-statoverride --update --add root root 4755 /usr/bin/bwrap

Regards,
    smcv

--- End Message ---
--- Begin Message ---
Version: 0.4.1-1

On Tue, 31 Mar 2020 at 20:25:01 +0100, Simon McVittie wrote:
> The bubblewrap 0.4.0-1 package in testing is vulnerable. This is fixed
> in 0.4.1-1, currently in unstable.

--- End Message ---

Reply via email to