Firejail Project

Firejail

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 09.06.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 07:04:08

A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linu...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 08.02.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:01

Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.

  • EPSS 4.49%
  • Veröffentlicht 11.08.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:07:57

Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.

  • EPSS 0.14%
  • Veröffentlicht 11.08.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:07:57

Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 03.06.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:09

In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.

  • EPSS 1.37%
  • Veröffentlicht 31.05.2019 12:29:02
  • Zuletzt bearbeitet 21.11.2024 04:22:58

Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (wit...

  • EPSS 0.03%
  • Veröffentlicht 13.04.2017 14:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges.

  • EPSS 0.04%
  • Veröffentlicht 13.04.2017 14:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges.

  • EPSS 0.04%
  • Veröffentlicht 13.04.2017 14:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Firejail does not properly clean environment variables, which allows local users to gain privileges.

  • EPSS 0.03%
  • Veröffentlicht 13.04.2017 14:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges.