Firejail is vulnerable to the escalation of privileges due to an incomplete fix for CVE-2017-5180.
Package | sys-apps/firejail on all architectures |
---|---|
Affected versions | < 0.9.44.8 |
Unaffected versions | >= 0.9.44.8 |
Package | sys-apps/firejail-lts on all architectures |
---|---|
Affected versions | < 0.9.38.10 |
Unaffected versions | >= 0.9.38.10 |
A SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.
The unaffected packages listed in GLSA 201612-48 had an incomplete fix as reported by Sebastian Krahmer of SuSE. This has been properly patched in the latest releases.
An attacker could possibly bypass sandbox protection, cause a Denial of Service condition, or escalate privileges.
There is no known workaround at this time.
All Firejail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.44.8"
All Firejail-lts users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/firejail-lts-0.9.38.10"
Release date
February 09, 2017
Latest revision
February 09, 2017: 1
Severity
high
Exploitable
local
Bugzilla entries