Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 | issue tracking third party advisory patch |
https://security.gentoo.org/glsa/201702-03 | third party advisory vendor advisory |
https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f | issue tracking third party advisory patch |
https://firejail.wordpress.com/download-2/release-notes/ | release notes vendor advisory |
http://www.openwall.com/lists/oss-security/2017/01/31/16 | mailing list third party advisory patch |
https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/96221 | vdb entry third party advisory |