Firejail is vulnerable to the escalation of privileges due to an incomplete fix for CVE-2017-5180.
|Package||sys-apps/firejail on all architectures|
|Affected versions||< 0.9.44.8|
|Unaffected versions||>= 0.9.44.8|
|Package||sys-apps/firejail-lts on all architectures|
|Affected versions||< 0.9.38.10|
|Unaffected versions||>= 0.9.38.10|
A SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.
The unaffected packages listed in GLSA 201612-48 had an incomplete fix as reported by Sebastian Krahmer of SuSE. This has been properly patched in the latest releases.
An attacker could possibly bypass sandbox protection, cause a Denial of Service condition, or escalate privileges.
There is no known workaround at this time.
All Firejail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.44.8"
All Firejail-lts users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/firejail-lts-0.9.38.10"
February 09, 2017
February 09, 2017: 1