DEBIAN-CVE-2017-5226

Source
https://security-tracker.debian.org/tracker/CVE-2017-5226
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-5226.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-5226
Upstream
Published
2017-03-29T20:59:00Z
Modified
2025-09-25T22:40:41Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.

References

Affected packages

Debian:11 / bubblewrap

Package

Name
bubblewrap
Purl
pkg:deb/debian/bubblewrap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / bubblewrap

Package

Name
bubblewrap
Purl
pkg:deb/debian/bubblewrap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / bubblewrap

Package

Name
bubblewrap
Purl
pkg:deb/debian/bubblewrap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / bubblewrap

Package

Name
bubblewrap
Purl
pkg:deb/debian/bubblewrap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}