On Mon, Jan 09, 2017 at 05:29:11PM +0000, Simon McVittie wrote:
> Control: reassign 850702 bubblewrap 0~git160513-1
> Control: forwarded 850702 
> https://github.com/projectatomic/bubblewrap/issues/142
> Control: tags 850702 + security upstream
> 
> On Mon, 09 Jan 2017 at 14:19:36 +0100, up201407...@alunos.dcc.fc.up.pt wrote:
> > When executing a program via the bubblewrap sandbox, the nonpriv
> > session can escape to the parent session by using the TIOCSTI ioctl to
> > push characters into the terminal's input buffer, allowing an attacker
> > to escape the sandbox.
> 
> Thanks. Do you have a proposed or preferred solution for this?

This affects a range of other packages:
login: CVE-2005-4890
policycoreutils: CVE-2016-7545
coreutils: CVE-2016-2781
util-linux: CVE-2016-2779
policykit: CVE-2016-2568

I think we should just restrict the ioctl to non-privileged users...

Cheers,
        Moritz

Reply via email to