First published: Thu Feb 09 2017(Updated: )
Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firejail Project Firejail | >=0.9.38<=0.9.38.10 | |
Firejail Project Firejail | >=0.9.40<=0.9.44.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5940 is classified as a high severity vulnerability due to the potential for local users to escape sandbox restrictions.
To fix CVE-2017-5940, you should upgrade Firejail to version 0.9.44.6 or later, or to 0.9.38.10 LTS or later.
CVE-2017-5940 affects Firejail versions prior to 0.9.44.6 and 0.9.38.10 for the Long Term Support (LTS) versions.
The attack related to CVE-2017-5940 involves local users exploiting symlink vulnerabilities to bypass sandbox restrictions.
Yes, CVE-2017-5940 can potentially allow local users to access user files by exploiting the sandbox escape flaw.