Impact
bubblewrap is a low‑level sandboxing tool used to isolate user processes. From version 0.11.0 up to, but not including, 0.11.2, installing the binary with the setuid bit set lets a local user attach to it with ptrace and intervene in the sandbox setup. This manipulation allows the user to invoke privileged operations such as overlay mounts, which are normally prohibited in the setuid build. The result is a privilege‑escalation vulnerability (CWE‑269) that can give a regular user root‑level capabilities within the sandbox.
Affected Systems
All distributions that ship the bubblewrap 0.11.0 or 0.11.1 releases and configure the binary with setuid permissions are vulnerable. The issue applies to any environment where bubblewrap is used as a setuid helper.
Risk and Exploitability
The CVSS score is 8.7, indicating a high severity flaw. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalogue. Exploitation requires a local user to have permission to run the setuid bubblewrap binary; once ran, the attacker can use ptrace to gain elevated privileges. The patch in 0.11.2 removes the setuid check that permits ptrace interaction, eliminating the attack vector.
OpenCVE Enrichment