bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html | |
https://access.redhat.com/errata/RHSA-2019:1833 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1695963 | Issue Tracking Third Party Advisory |
https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e | Patch Third Party Advisory |
https://github.com/projectatomic/bubblewrap/issues/304 | Third Party Advisory |
https://github.com/projectatomic/bubblewrap/releases/tag/v0.3.3 | Release Notes Third Party Advisory |
https://security.gentoo.org/glsa/202006-18 |
Configurations
History
No history.
Information
Published : 2019-05-29 15:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-12439
Mitre link : CVE-2019-12439
CVE.ORG link : CVE-2019-12439
JSON object : View
Products Affected
projectatomic
- bubblewrap
CWE
CWE-20
Improper Input Validation