Firejail: Local Privilege Escalation — GLSA 202305-19

A vulnerability has been discovered in Firejail which could result in local root privilege escalation.

Affected packages

sys-apps/firejail on all architectures
Affected versions < 0.9.70
Unaffected versions >= 0.9.70
sys-apps/firejail-lts on all architectures
Affected versions <= 0.9.56.2-r1
Unaffected versions

Background

A SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.

Description

Firejail does not sufficiently validate the user's environment prior to using it as the root user when using the --join command line option.

Impact

An unprivileged user can exploit this vulnerability to achieve local root privileges.

Workaround

System administrators can mitigate this vulnerability via adding either "force-nonewprivs yes" or "join no" to the Firejail configuration file in /etc/firejail/firejail.config.

Resolution

Gentoo has discontinued support for sys-apps/firejail-lts. Users should unmerge it in favor of sys-apps/firejail:

 # emerge --ask --depclean --verbose "sys-apps/firejail-lts"
 # emerge --ask --verbose "sys-apps/firejail"
 

All Firejail users should upgrade to the latest version:

 # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.70"
 

References

Release date
May 03, 2023

Latest revision
May 03, 2023: 1

Severity
normal

Exploitable
remote

Bugzilla entries