First published: Fri May 31 2019(Updated: )
Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the --shutdown control command). This is similar to CVE-2019-5736.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firejail Project Firejail | <0.9.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12499 is a vulnerability that allows truncation of the firejail binary on the host, potentially leading to arbitrary code execution.
CVE-2019-12499 has a severity rating of 8.1 (critical).
Firejail versions up to and excluding 0.9.60 are affected by CVE-2019-12499.
The vulnerability can be exploited by running exploit code inside a firejail sandbox and terminating the sandbox.
Yes, you can find references for CVE-2019-12499 at the following links: [link1], [link2], [link3].