bubblewrap escape via TIOCSTI ioctl

Bug #1657357 reported by Jeremy Bícha
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
bubblewrap (Debian)
Fix Released
Unknown
bubblewrap (Ubuntu)
Fix Released
Medium
Unassigned
flatpak (Ubuntu)
Fix Released
Medium
Unassigned

Bug Description

Another bubblewrap security issue for yakkety. Changelogs are derived from Debian's. This has already been fixed in Debian and zesty.
This has been fixed in Debian and upstream in both bubblewrap and Flatpak which need to be updated at the same time.

For Flatpak, this is just backporting
https://github.com/flatpak/flatpak/commit/902fb7139

For bubblewrap, there's only a few other bugfixes added in the new upstream version 0.1.7 since 0.1.5 so I think we'd be better off just taking the new version:
https://github.com/projectatomic/bubblewrap/releases
https://github.com/projectatomic/bubblewrap/commits/master

Originally, I mixed this bug with LP: #1656712 but it's a lot simpler now.

Tags: yakkety

CVE References

Jeremy Bícha (jbicha)
information type: Public → Public Security
Mathew Hodson (mhodson)
Changed in bubblewrap (Ubuntu):
importance: Undecided → Medium
Changed in flatpak (Ubuntu):
importance: Undecided → Medium
Revision history for this message
Mathew Hodson (mhodson) wrote :

I noticed the changelog links to the wrong bug in the flatpak and bubblewrap debdiffs.

It links to an older security bug not this one.

Changed in bubblewrap (Debian):
status: Unknown → Fix Released
Revision history for this message
Jeremy Bícha (jbicha) wrote :

Thanks Mathew, I fixed that now.

Revision history for this message
Jeremy Bícha (jbicha) wrote :
Jeremy Bícha (jbicha)
description: updated
Revision history for this message
Jeremy Bícha (jbicha) wrote :

I've added a second patch to the Flatpak debdiff. Another security-related commit from 0.8.2. I had to refresh the last 3 hunks so the patch would apply cleanly.

https://github.com/flatpak/flatpak/commit/7db0ac595c

Tyler Hicks (tyhicks)
Changed in bubblewrap (Ubuntu):
status: New → Confirmed
Changed in flatpak (Ubuntu):
status: New → Confirmed
Revision history for this message
Tyler Hicks (tyhicks) wrote :

@jbicha Thanks for the debdiffs! sbeattie reviewed the flatpak debdiff and I reviewed the bubblewrap debdiff. They've both built in the security-proposed PPA.

As for the bubblewrap changes, I'm going to sponsor them but I do want to say that I worry that we're getting in the habit of doing version bumps for bubblewrap. That's definitely not preferred but all of the changes between 1.5 and 1.7 seem somewhat tangled up with the actual security fix so I'm going to make an exception.

Thanks again for the high quality debdiffs. We really appreciate it!

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package flatpak - 0.6.11-1ubuntu0.16.10.0

---------------
flatpak (0.6.11-1ubuntu0.16.10.0) yakkety-security; urgency=medium

  * SECURITY UPDATE: bubblewrap escape via TIOCSTI ioctl (LP: #1657357)
    - Fixed in d/p/Use-seccomp-to-filter-out-TIOCSTI-ioctl.patch:
      Add patch from upstream 0.8.1 to prevent contained apps from using
      TIOCSTI ioctl. This would let the app inject commands into the
      terminal from which it was invoked. Prevent the attack here
      by using seccomp to filter out TIOCSTI ioctl.
    - CVE-2017-5226
  * SECURITY UPDATE: Prevent writing to per-user installed fonts and
    Flatpak extensions (typically locales)
    - Fixed in d/p/Make-sure-all-mounted-sources-are-read-only.patch:
      Add patch from upstream 0.8.2

 -- Jeremy Bicha <email address hidden> Sat, 28 Jan 2017 06:00:41 -0500

Changed in flatpak (Ubuntu):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package bubblewrap - 0.1.7-0ubuntu0.16.10.1

---------------
bubblewrap (0.1.7-0ubuntu0.16.10.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: bubblewrap escape via TIOCSTI ioctl (LP: #1657357)
    - Fixed in new upstream release 0.1.7 by adding --new-session
      option that use setsid() before executing sandboxed code.
      Users of bubblewrap to confine untrusted programs should either
      add --new-session to the bwrap command line, or prevent the
      TIOCSTI ioctl with a seccomp filter instead (as Flatpak does).
    - New upstream release also adds --unshare-all option to easily
      sandbox all namespaces. A --share-net option can be used with
      --unshare-all to retain the network namespace.
    - CVE-2017-5226
  * debian/bubblewrap.examples: install upstream examples

 -- Jeremy Bicha <email address hidden> Thu, 19 Jan 2017 21:31:11 -0500

Changed in bubblewrap (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.