Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/201701-62 | Patch Third Party Advisory VDB Entry |
https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e | Issue Tracking Patch Third Party Advisory |
https://firejail.wordpress.com/download-2/release-notes/ | Release Notes Vendor Advisory |
https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/07/5 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/97120 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-03-23 09:59
Updated : 2019-10-02 17:03
NVD link : CVE-2017-5206
Mitre link : CVE-2017-5206
JSON object : View
CWE
Products Affected
firejail_project
- firejail
linux
- linux_kernel