[Bug 1873925] [NEW] Sync bubblewrap 0.4.1-1 (main) from Debian unstable (main)

Launchpad Bug Tracker 1873925 at bugs.launchpad.net
Mon Apr 20 17:48:03 UTC 2020


You have been subscribed to a public bug by Amr Ibrahim (amribrahim1987):

Please sync bubblewrap 0.4.1-1 (main) from Debian unstable (main)

The sync includes the security fix, which is already included in
0.4.0-1ubuntu4, and other minor fixes.

https://github.com/containers/bubblewrap/releases/tag/v0.4.1

- Always clear the capability bounding set (cosmetic issue)
- Make the tests work with libcap >= 2.29
- Properly report child exit status in some cases

Alexander Larsson (9):
Ensure we're always clearing the cap bounding set
Don't rely on geteuid() to know when to switch back from setuid root
Don't support --userns2 in setuid mode
drop_privs: More explicit argument name

Christian Kastner (1):
tests: Update output patterns for libcap >= 2.29

Jean-Baptiste BESNARD (1):
retcode: fix return code with syncfd and no event_fd

TomSweeneyRedHat (1):
Add Code of Conduct

Explanation of the Ubuntu delta and why it can be dropped:
  * SECURITY UPDATE: privilege escalation when used in setuid mode
    - debian/patches/CVE-2020-5291.patch: don't rely on geteuid() to know
      when to switch back from setuid root in bubblewrap.c.
    - CVE-2020-5291
  * d/p/update-output-patterns-libcap-2.29.patch: cherry-pick fix proposed
    fix to capability drop-related tests, which broke with newer libcap2.
  * No-change rebuild with fixed binutils on arm64.
  * Make autopkgtests cross-test-friendly.

All changes are now in Debian.

Changelog entries since current focal version 0.4.0-1ubuntu4:

bubblewrap (0.4.1-1) unstable; urgency=high

  * New upstream release
    - Fixes a root privilege escalation vulnerability introduced in 0.4.0,
      in cases where the kernel allows creation of user namespaces by
      unprivileged users and bwrap is (unnecessarily) setuid root.
      Debian systems are vulnerable if
      /proc/sys/kernel/unprivileged_userns_clone (default 0) has been
      changed to 1, or if using an upstream kernel instead of a Debian
      kernel.
      Ubuntu systems are not normally vulnerable, because bwrap is not
      normally setuid there.
      (GHSA-j2qp-rvxj-43vj, CVE ID pending)
    - Fixes test failure with libcap >= 2.29 (Closes: #951577)
  * Update various URLs from https://github.com/projectatomic/bubblewrap
    to https://github.com/containers/bubblewrap
  * Set upstream metadata fields: Repository.
  * Remove obsolete field Name from debian/upstream/metadata (already
    present in machine-readable debian/copyright).
  * Standards-Version: 4.5.0 (no changes required)
  * d/tests/control: Qualify CLI tools with :native.
    Thanks to Steve Langasek (Closes: #948617)

 -- Simon McVittie <smcv at debian.org>  Mon, 30 Mar 2020 14:33:54 +0100

** Affects: bubblewrap (Ubuntu)
     Importance: Undecided
         Status: New

-- 
Sync bubblewrap 0.4.1-1 (main) from Debian unstable (main)
https://bugs.launchpad.net/bugs/1873925
You received this bug notification because you are a member of Ubuntu Sponsors Team, which is subscribed to the bug report.



More information about the Ubuntu-sponsors mailing list