CVE-2017-5226

When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectatomic:bubblewrap:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2020/07/10/1 - () http://www.openwall.com/lists/oss-security/2020/07/10/1 -
References () http://www.openwall.com/lists/oss-security/2023/03/17/1 - () http://www.openwall.com/lists/oss-security/2023/03/17/1 -
References () http://www.securityfocus.com/bid/97260 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97260 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1411811 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1411811 - Issue Tracking, Patch
References () https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117 - Patch () https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117 - Patch
References () https://github.com/projectatomic/bubblewrap/issues/142 - Exploit, Patch, Vendor Advisory () https://github.com/projectatomic/bubblewrap/issues/142 - Exploit, Patch, Vendor Advisory
References () https://www.openwall.com/lists/oss-security/2023/03/14/2 - () https://www.openwall.com/lists/oss-security/2023/03/14/2 -

Information

Published : 2017-03-29 20:59

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5226

Mitre link : CVE-2017-5226

CVE.ORG link : CVE-2017-5226


JSON object : View

Products Affected

projectatomic

  • bubblewrap
CWE
CWE-20

Improper Input Validation