Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <aeygshq_JaijQUUm@definition.pseudorandom.co.uk>
Date: Sat, 25 Apr 2026 12:08:34 +0100
From: Simon McVittie <smcv@...ian.org>
To: oss-security@...ts.openwall.com
Subject: bubblewrap CVE-2026-41163: Privilege escalation if
 setuid root, via ptrace

https://github.com/containers/bubblewrap/security/advisories/GHSA-xq78-7hw4-5jvp
Vulnerable: bubblewrap >= 0.11.0 if installed setuid
Fixed: bubblewrap >= 0.11.2
Not believed to be vulnerable: bubblewrap < 0.11.0

If bubblewrap 0.11.0 or 0.11.1 is installed in setuid mode, then the 
user can use ptrace to attach to bubblewrap and control the unprivileged 
part of the sandbox setup phase. This allows a local attacker to 
arbitrarily use the privileged operations, and in particular the 
"overlay mount" operation, allowing the creation of overlay mounts which 
is otherwise not allowed in the setuid version of bubblewrap.

A mitigation is that most Linux distributions do not install bubblewrap 
as setuid root. This was historically done on distros where a hardened 
or feature-limited kernel did not allow unprivileged users to create new 
user namespaces, mainly Debian <= 10 and RHEL <= 7. Debian >= 11 and 
RHEL >= 8 already switched to installing bubblewrap as non-setuid, which 
is the recommended configuration.

Arch Linux has a non-default bubblewrap-suid package, intended for use 
with their non-default linux-hardened kernel package, which would have 
been vulnerable to this attack (it was fixed earlier today). Similarly, 
unfixed versions of Gentoo's bubblewrap package would be vulnerable if 
built with the "suid" USE flag. Any distro's bubblewrap packages of an 
affected version would be vulnerable if the local sysadmin had manually 
set the executable to be setuid root.

The bubblewrap maintainers recommend that it should not be installed 
setuid root. By default the 0.11.2 release will refuse to run if it 
detects that it is setuid, but for backward compatibility it has a 
build-time option that will allow the setuid mode. As a hardening 
measure, the next upstream release (0.12.0) will remove the build-time 
option, and instead, unconditionally refuse to run when setuid.

The older vulnerabilities CVE-2020-5291 and CVE-2016-8659 were similarly 
only relevant when installed setuid root, and were avoided by the 
recommended configuration.

Thanks to fdiakh for reporting this vulnerability and helping to address 
it.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.