bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
References
Link | Resource |
---|---|
https://github.com/projectatomic/bubblewrap/releases/tag/v0.3.3 | Release Notes Third Party Advisory |
https://github.com/projectatomic/bubblewrap/issues/304 | Third Party Advisory |
https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1695963 | Issue Tracking Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html | |
https://access.redhat.com/errata/RHSA-2019:1833 | |
https://security.gentoo.org/glsa/202006-18 |
Configurations
Information
Published : 2019-05-29 08:29
Updated : 2020-06-15 11:15
NVD link : CVE-2019-12439
Mitre link : CVE-2019-12439
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
projectatomic
- bubblewrap