CVE-2020-5291

EUVD-2020-26485
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that this only affects the combination of bubblewrap in setuid mode (which is typically used when unprivileged user namespaces are not supported) and the support of unprivileged user namespaces. Known to be affected are: * Debian testing/unstable, if unprivileged user namespaces enabled (not default) * Debian buster-backports, if unprivileged user namespaces enabled (not default) * Arch if using `linux-hardened`, if unprivileged user namespaces enabled (not default) * Centos 7 flatpak COPR, if unprivileged user namespaces enabled (not default) This has been fixed in the 0.4.1 release, and all affected users should update.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
GitHub_MCNA
7.2 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
Affected Products (NVD)
VendorProductVersion
projectatomicbubblewrap
𝑥
< 0.4.1
debiandebian_linux
10.0
archlinuxarch_linux
-
centoscentos
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bubblewrap
bookworm
0.8.0-2+deb12u1
fixed
bookworm (security)
0.8.0-2+deb12u1
fixed
bullseye
0.4.1-3
fixed
buster
not-affected
sid
0.11.0-1
fixed
stretch
not-affected
trixie
0.11.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bubblewrap
bionic
not-affected
eoan
not-affected
focal
Fixed 0.4.0-1ubuntu4
released
groovy
Fixed 0.4.0-1ubuntu4
released
trusty
dne
xenial
dne