Search CVE reports
1 – 10 of 18 results
A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an...
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 1 of 4
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Not affected | Not affected | Fixed | Needs evaluation |
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Not affected | Not affected | Needs evaluation | Needs evaluation |
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Not affected | Not affected | Needs evaluation | Needs evaluation |
Some fixes available 13 of 17
In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Fixed | Fixed | Fixed | Vulnerable |
Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be...
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Not affected | Not affected | Not affected | Vulnerable |
Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | — | — | — | — |
Firejail does not properly clean environment variables, which allows local users to gain privileges.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | Not affected | Not affected | Not affected | Not affected |
Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | — | — | — | — |
Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges.
1 affected package
firejail
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firejail | — | — | — | — |