* SECURITY UPDATE: bubblewrap escape via TIOCSTI ioctl (LP: #1657357)
- Fixed in new upstream release 0.1.7 by adding --new-session
option that use setsid() before executing sandboxed code.
Users of bubblewrap to confine untrusted programs should either
add --new-session to the bwrap command line, or prevent the
TIOCSTI ioctl with a seccomp filter instead (as Flatpak does).
- New upstream release also adds --unshare-all option to easily
sandbox all namespaces. A --share-net option can be used with
--unshare-all to retain the network namespace.
- CVE-2017-5226
* debian/bubblewrap.examples: install upstream examples
-- Jeremy Bicha <email address hidden> Thu, 19 Jan 2017 21:31:11 -0500
This bug was fixed in the package bubblewrap - 0.1.7-0ubuntu0. 16.10.1
--------------- 0ubuntu0. 16.10.1) yakkety-security; urgency=medium
bubblewrap (0.1.7-
* SECURITY UPDATE: bubblewrap escape via TIOCSTI ioctl (LP: #1657357) bubblewrap. examples: install upstream examples
- Fixed in new upstream release 0.1.7 by adding --new-session
option that use setsid() before executing sandboxed code.
Users of bubblewrap to confine untrusted programs should either
add --new-session to the bwrap command line, or prevent the
TIOCSTI ioctl with a seccomp filter instead (as Flatpak does).
- New upstream release also adds --unshare-all option to easily
sandbox all namespaces. A --share-net option can be used with
--unshare-all to retain the network namespace.
- CVE-2017-5226
* debian/
-- Jeremy Bicha <email address hidden> Thu, 19 Jan 2017 21:31:11 -0500