When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an malicious user to escape the sandbox.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
projectatomic bubblewrap |