Control: reassign 850702 bubblewrap 0~git160513-1
Control: forwarded 850702 https://github.com/projectatomic/bubblewrap/issues/142
Control: tags 850702 + security upstream

On Mon, 09 Jan 2017 at 14:19:36 +0100, up201407...@alunos.dcc.fc.up.pt wrote:
> When executing a program via the bubblewrap sandbox, the nonpriv
> session can escape to the parent session by using the TIOCSTI ioctl to
> push characters into the terminal's input buffer, allowing an attacker
> to escape the sandbox.

Thanks. Do you have a proposed or preferred solution for this?

Please direct any further correspondence about this bug upstream if
possible: I've opened a GitHub bug
https://github.com/projectatomic/bubblewrap/issues/142 for that.

> This has been assigned CVE-2017-5226.

Assigned by whom?

If you are auditing for security vulnerabilities, please try to follow the
normal disclosure best-practices: in particular, if a vulnerability is not
already public, please contact upstream maintainers privately first, to
give them a chance to fix a vulnerability before the general public know
about it.

Regards,
    S

Reply via email to