CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. | 7.8 |
High |
||
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection. | 9.8 |
Critical |
||
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection. | 7.8 |
High |
||
Firejail does not restrict access to --tmpfs, which allows local users to gain privileges, as demonstrated by mounting over /etc. | 7.8 |
High |
||
Firejail allows local users to truncate /etc/resolv.conf via a chroot command to /. | 3.3 |
Low |
||
Firejail uses 0777 permissions when mounting /tmp, which allows local users to gain privileges. | 7.8 |
High |
||
Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges. | 7.8 |
High |
||
Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges. | 7.8 |
High |
||
Firejail does not properly clean environment variables, which allows local users to gain privileges. | 7.8 |
High |
||
Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges. | 7.8 |
High |
||
Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument. | 9 |
Critical |
||
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument. | 7.8 |
High |