Description
bubblewrap is a low-level unprivileged sandboxing tool. From version 0.11.0 to before version 0.11.2, if bubblewrap is installed in setuid mode then the user can use ptrace to attach to bubblewrap and control the unprivileged part of the sandbox setup phase. This allows the attacker to arbitrarily use the privileged operations, and in particular the "overlay mount" operation, allowing the creation of overlay mounts which is otherwise not allowed in the setuid version of bubblewrap. This issue has been patched in version 0.11.2.
Published: 2026-05-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

bubblewrap is a low‑level sandboxing tool used to isolate user processes. From version 0.11.0 up to, but not including, 0.11.2, installing the binary with the setuid bit set lets a local user attach to it with ptrace and intervene in the sandbox setup. This manipulation allows the user to invoke privileged operations such as overlay mounts, which are normally prohibited in the setuid build. The result is a privilege‑escalation vulnerability (CWE‑269) that can give a regular user root‑level capabilities within the sandbox.

Affected Systems

All distributions that ship the bubblewrap 0.11.0 or 0.11.1 releases and configure the binary with setuid permissions are vulnerable. The issue applies to any environment where bubblewrap is used as a setuid helper.

Risk and Exploitability

The CVSS score is 8.7, indicating a high severity flaw. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalogue. Exploitation requires a local user to have permission to run the setuid bubblewrap binary; once ran, the attacker can use ptrace to gain elevated privileges. The patch in 0.11.2 removes the setuid check that permits ptrace interaction, eliminating the attack vector.

Generated by OpenCVE AI on May 9, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade bubblewrap to version 0.11.2 or newer to eliminate the flaw.
  • If an upgrade is not immediately possible, clear the setuid bit on the bubblewrap binary with ‘chmod u-s /usr/bin/bwrap’ (or the appropriate path).
  • Audit the system for any remaining setuid instances of bubblewrap and monitor for unexpected ptrace activity targeting the binary.

Generated by OpenCVE AI on May 9, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description bubblewrap is a low-level unprivileged sandboxing tool. From version 0.11.0 to before version 0.11.2, if bubblewrap is installed in setuid mode then the user can use ptrace to attach to bubblewrap and control the unprivileged part of the sandbox setup phase. This allows the attacker to arbitrarily use the privileged operations, and in particular the "overlay mount" operation, allowing the creation of overlay mounts which is otherwise not allowed in the setuid version of bubblewrap. This issue has been patched in version 0.11.2.
Title bubblewrap vulnerable to privilege escalation in setuid mode via ptrace
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-09T03:56:51.833Z

Reserved: 2026-04-17T16:34:45.525Z

Link: CVE-2026-41163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T04:16:21.167

Modified: 2026-05-09T04:16:21.167

Link: CVE-2026-41163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:30:16Z

Weaknesses