Debian Patches

Status for bubblewrap/0.11.0-2+deb13u1

Patch Description Author Forwarded Bugs Origin Last update
CVE-2026-41163/Don-t-run-the-privilege-separated-code-dumpable.patch Don't run the privilege separated code dumpable
If the unprivileged code is dumpable, then it can be attached to with
ptrace and execute arbitrary requests to the privileged part of the
setup. In some cases this allows privilege escalation, such as using
overlay mounts which would otherwise not be allowed in setuid mode.

dumpable, because otherwise the owner of /proc/self is root which
makes these processed not able to use features that are needed for
e.g. detarmining portal access.

Initially reported by François Diakhate <fdiakh@gmail.com>
Alexander Larsson <alexl@redhat.com> yes debian upstream upstream, 0.11.2, commit:10ed62f34a4565188887b06df1438ef8002c3c80 2026-04-14
CVE-2026-41163/fix-harden-privsep-parent-against-unexpected-operations.patch fix: harden privsep parent against unexpected operations François Diakhaté <fdiakh@gmail.com> yes debian upstream upstream, 0.11.2, commit:9e16c35582af7704958dd2b2ec3cba524c9605b6 2026-04-09
debian/Change-EPERM-error-message-to-show-Debian-specific-inform.patch Change EPERM error message to show Debian-specific information Simon McVittie <smcv@debian.org> not-needed 2021-01-01

All known versions for source package 'bubblewrap'

Links