When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T14:55:35.806Z
Reserved: 2017-01-09T00:00:00
Link: CVE-2017-5226

No data.

Status : Modified
Published: 2017-03-29T20:59:00.310
Modified: 2024-11-21T03:27:19.233
Link: CVE-2017-5226

No data.