When executing a program via the bubblewrap sandbox, the...
Critical severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Mar 17, 2023
Description
Published by the National Vulnerability Database
Mar 29, 2017
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Mar 17, 2023
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
References