Bug 20320 - firejail security vulnerability CVE-2017-5180
Summary: firejail security vulnerability CVE-2017-5180
Status: RESOLVED INVALID
Alias: None
Product: Mageia
Classification: Unclassified
Component: New RPM package request (show other bugs)
Version: Cauldron
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact:
URL: http://www.linuxsecurity.com/content/...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-02-19 21:57 CET by Zombie Ryushu
Modified: 2017-02-20 00:13 CET (History)
0 users

See Also:
Source RPM:
CVE:
Status comment:


Attachments

Description Zombie Ryushu 2017-02-19 21:57:25 CET
Firejail is vulnerable to the escalation of privileges due to an
incomplete fix for CVE-2017-5180.

Background
==========

A SUID program that reduces the risk of security breaches by
restricting the running environment of untrusted applications using
Linux namespaces and seccomp-bpf.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  sys-apps/firejail           < 0.9.44.8               >= 0.9.44.8
  2  sys-apps/firejail-lts      < 0.9.38.10              >= 0.9.38.10
    -------------------------------------------------------------------
     2 affected packages

Description
===========

The unaffected packages listed in GLSA 201612-48 had an incomplete fix
as reported by Sebastian Krahmer of SuSE. This has been properly
patched in the latest releases.

Impact
======

An attacker could possibly bypass sandbox protection, cause a Denial of
Service condition, or escalate privileges.
Zombie Ryushu 2017-02-19 21:57:58 CET

URL: (none) => http://www.linuxsecurity.com/content/view/170726/170/

Comment 1 David Walser 2017-02-20 00:13:53 CET
firejail is not packaged in Mageia.

Status: NEW => RESOLVED
Resolution: (none) => INVALID


Note You need to log in before you can comment on or make changes to this bug.