Bubblewrap: Arbitrary code execution — GLSA 202006-18

Bubblewrap misuses temporary directories allowing local code execution.

Affected packages

sys-apps/bubblewrap on all architectures
Affected versions < 0.4.1
Unaffected versions >= 0.4.1

Background

Bubblewrap is an unprivileged sandboxing tool namespaces-powered chroot-like solution.

Description

Bubblewrap misuses temporary directories in /tmp as a mount point.

Impact

This flaw may allow possible execution of code or prevention of running Bubblewrap.

Workaround

There is no known workaround at this time.

Resolution

All Bubblewrap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/bubblewrap-0.4.1"
 

References

Release date
June 15, 2020

Latest revision
June 15, 2020: 1

Severity
normal

Exploitable
local

Bugzilla entries