PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-41163 Unknown Vendor CVE debrief

CVE-2026-41163 is a high-severity bubblewrap issue affecting setuid installations. In vulnerable versions, a user can use ptrace to interfere with the unprivileged part of sandbox setup and steer privileged operations, including overlay mounts. The issue is fixed in bubblewrap 0.11.2.

Vendor
Unknown Vendor
Product
Unknown
CVSS
HIGH 8.7
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-09
Original CVE updated
2026-05-09
Advisory published
2026-05-09
Advisory updated
2026-05-09

Who should care

Administrators and platform teams running bubblewrap in setuid mode, especially on systems that rely on it for sandboxing or container-related workflows. Security teams should also review any packaging or deployment that ships the setuid variant.

Technical summary

According to the CVE description, bubblewrap versions 0.11.0 through before 0.11.2 are affected when installed in setuid mode. During sandbox setup, an attacker can ptrace the bubblewrap process and control the unprivileged setup phase, which can in turn influence privileged operations. The advisory specifically calls out the overlay mount operation, which should not be available in the setuid version, and notes that the flaw is corrected in 0.11.2.

Defensive priority

High. This is a privilege-boundary flaw in a setuid sandbox tool, so affected deployments should be prioritized for patching and configuration review.

Recommended defensive actions

  • Upgrade bubblewrap to version 0.11.2 or later.
  • Inventory systems that install or execute bubblewrap in setuid mode.
  • Review whether setuid deployment is necessary in each environment and reduce exposure where possible.
  • Validate that sandbox and container workflows still function correctly after upgrading.
  • Track downstream packages or distributions that may bundle an affected bubblewrap version.

Evidence notes

This debrief is based on the supplied CVE record and official GitHub references. The CVE was published and modified on 2026-05-09. The NVD record states the vulnerable range as bubblewrap 0.11.0 to before 0.11.2 and includes a high-severity CVSS 4.0 vector. The GitHub release and security advisory references indicate the fix is present in 0.11.2.

Official resources

Publicly disclosed on 2026-05-09. The supplied record indicates the issue is fixed in bubblewrap 0.11.2.