bubblewrap is vulnerable to arbitrary code execution. A misuse of temporary directories in /tmp
as a mount point allows a local attacker to exploit the vulnerability to execute arbitrary code or prevent other users from executing bubblewrap.
lists.opensuse.org/opensuse-security-announce/2019-06/msg00028.html
lists.opensuse.org/opensuse-security-announce/2019-07/msg00015.html
access.redhat.com/documentation/en-us/red_hat_cloudforms/4.7/html/release_notes
access.redhat.com/errata/RHBA-2019:1644
access.redhat.com/errata/RHSA-2019:1833
access.redhat.com/security/updates/classification/#low
bugzilla.redhat.com/show_bug.cgi?id=1695963
bugzilla.redhat.com/show_bug.cgi?id=1702497
bugzilla.redhat.com/show_bug.cgi?id=1721118
bugzilla.redhat.com/show_bug.cgi?id=1724715
bugzilla.redhat.com/show_bug.cgi?id=1725894
bugzilla.redhat.com/show_bug.cgi?id=1725960
bugzilla.redhat.com/show_bug.cgi?id=1726388
bugzilla.redhat.com/show_bug.cgi?id=1726394
bugzilla.redhat.com/show_bug.cgi?id=1726438
bugzilla.redhat.com/show_bug.cgi?id=1726667
bugzilla.redhat.com/show_bug.cgi?id=1727970
bugzilla.redhat.com/show_bug.cgi?id=1727989
bugzilla.redhat.com/show_bug.cgi?id=1727990
bugzilla.redhat.com/show_bug.cgi?id=1728033
github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e
github.com/projectatomic/bubblewrap/issues/304
github.com/projectatomic/bubblewrap/releases/tag/v0.3.3
security.gentoo.org/glsa/202006-18