Bubblewrap vulnerability (CVE-2020-5291) allows privilege escalation via user namespaces. Learn about the impact, affected systems, exploitation mechanism, and mitigation steps.
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the
bwrap --userns2
option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. This vulnerability affects various Linux distributions and has a CVSS base score of 7.2.
Understanding CVE-2020-5291
Bubblewrap vulnerability allowing privilege escalation via user namespaces.
What is CVE-2020-5291?
Bubblewrap vulnerability in setuid mode with unprivileged user namespaces support, allowing root access.
The Impact of CVE-2020-5291
Technical Details of CVE-2020-5291
Bubblewrap vulnerability details.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to mitigate and prevent exploitation of CVE-2020-5291.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates