Quoting "Simon McVittie" :
Control: reassign 850702 bubblewrap 0~git160513-1
Control: forwarded 850702
https://github.com/projectatomic/bubblewrap/issues/142
Control: tags 850702 + security upstream
On Mon, 09 Jan 2017 at 14:19:36 +0100, up201407...@alunos.dcc.fc.up.pt wrote:
When executing
Source: bubblewrap
Version: All
Severity: grave
Hi,
When executing a program via the bubblewrap sandbox, the nonpriv
session can escape to the parent session by using the TIOCSTI ioctl to
push characters into the terminal's input buffer, allowing an attacker
to escape the sandbox.
This has been
2 matches
Mail list logo