Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
References
Link | Resource |
---|---|
https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 | Issue Tracking Patch Third Party Advisory |
https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef | Issue Tracking Patch Third Party Advisory |
https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f | Issue Tracking Patch Third Party Advisory |
https://firejail.wordpress.com/download-2/release-notes/ | Release Notes Vendor Advisory |
http://www.openwall.com/lists/oss-security/2017/01/31/16 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96221 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201702-03 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-02-09 10:59
Updated : 2019-10-02 17:03
NVD link : CVE-2017-5940
Mitre link : CVE-2017-5940
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
firejail_project
- firejail