Source: firejail
Version: 0.9.52-1
Severity: critical
Tags: security upstream pending fixed-upstream
Forwarded: https://github.com/netblue30/firejail/issues/2718
X-Debbugs-CC: t...@security.debian.org

A bug in firejail allows bypassing seccomp protection when
an existing jail is joined with another one [2].

Upstream description [0]:
> Seccomp filters are copied into /run/firejail/mnt, and are writable
> within the jail. A malicious process can modify files from inside the
> jail. Processes that are later joined to the jail will not have seccomp
> filters applied.

A fix is available [1] and also released in the new upstream version 0.9.60.
I will upload a backported fix to 0.9.58.2-1 to unstable soon.

The earliest acknowledged version that is affected is 0.9.52 (upstream
provides a patch for this version in [0]), but likely earlier versions
are affected as well.

According to [2], a CVE number has been requested.

[0] 
https://github.com/netblue30/firejail/commit/30f6000e72bd8d9eee6a0d2e700d69ed9be3aa29
[1] 
https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134
[2] https://github.com/netblue30/firejail/issues/2718

Attachment: signature.asc
Description: PGP signature

Reply via email to