[Pkg-utopia-maintainers] Bug#1134965: trixie-pu: package bubblewrap/0.11.0-2+deb13u1

Simon McVittie smcv at debian.org
Sun Apr 26 14:33:35 BST 2026


Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: bubblewrap at packages.debian.org
Control: affects -1 + src:bubblewrap
User: release.debian.org at packages.debian.org
Usertags: pu

[ Reason ]

Fix CVE-2026-41163, a privilege escalation vulnerability in the 
deprecated configuration where /usr/bin/bwrap is setuid root

[ Impact ]

If the local sysadmin has manually set /usr/bin/bwrap to be setuid root 
(normally via dpkg-statoverride), a malicious local user could use it to 
mount overlayfs filesystems in their containers' filesystems, and 
perhaps make use of that ability to carry out other attacks.

In practice a sysadmin would likely only do this if they have configured 
their kernel to reject attempts to create user namespaces in 
unprivileged processes (like the Debian 10 kernel did). Many Flatpak 
apps will already not work as intended in this setup, because they 
require features that bubblewrap only exposes when it is unprivileged.

[ Tests ]

The proposed bubblewrap can still run Flatpak apps on a Debian 13 GNOME 
desktop (tried Discord in the normal configuration where bubblewrap is 
unprivileged, and GNOME Nibbles in the deprecated configuration where 
bwrap is setuid root).

[ Risks ]

A straightforward backport from bubblewrap 0.11.2-1 in unstable, which 
is not yet in testing but should get there next week.

In particular I decided to leave the setuid-root configuration as still 
possible in Debian 13, to minimize regression risk.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

All changes are part of fixing CVE-2026-41163. Strictly speaking the 
second patch 
debian/patches/CVE-2026-41163/fix-harden-privsep-parent-against-unexpected-operations.patch 
is only hardening rather than being strictly required (those checks 
should never fail if the first patch has worked as intended), but it's 
rather simple.

[ Other info ]

The security team declined to do a DSA for this, on the basis that the 
deprecated configuration no longer makes sense for desktop workloads 
in Debian >= 11, and users of a non-default security posture are 
responsible for the consequences of their choices.

After bubblewrap 0.11.2-1 has migrated to testing, I intend to swap the 
value of its new -Dsupport_setuid option so that /usr/bin/bwrap will 
refuse to run if it detects setuid (or more precisely, euid != uid). 
Similarly, upstream plans to remove that option in 0.12.0 so that newer 
bwrap releases will unconditionally refuse to run setuid.

As a result, the deprecated setup will likely no longer be possible in 
Debian 14, preventing vulnerabilities like this one.



More information about the Pkg-utopia-maintainers mailing list