Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/01/31/16 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96221 | Third Party Advisory VDB Entry |
https://firejail.wordpress.com/download-2/release-notes/ | Release Notes Vendor Advisory |
https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f | Issue Tracking Patch Third Party Advisory |
https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef | Issue Tracking Patch Third Party Advisory |
https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201702-03 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-02-09 18:59
Updated : 2019-10-03 00:03
NVD link : CVE-2017-5940
Mitre link : CVE-2017-5940
CVE.ORG link : CVE-2017-5940
JSON object : View
Products Affected
firejail_project
- firejail
CWE
CWE-269
Improper Privilege Management