Firejail Project Firejail 0.9.32

CPE Details

Firejail Project Firejail 0.9.32
0.9.32
2019-06-18
22h22 +00:00
2019-06-18
22h22 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:firejail_project:firejail:0.9.32:-:*:*:*:*:*:*

Informations

Vendor

firejail_project

Product

firejail

Version

0.9.32

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-26910 2021-02-08 18h56 +00:00 Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
7.8
High
CVE-2020-17368 2020-08-11 13h59 +00:00 Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
9.8
Critical
CVE-2020-17367 2020-08-11 13h58 +00:00 Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
7.8
High
CVE-2017-5206 2017-03-23 15h00 +00:00 Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
9
Critical
CVE-2017-5207 2017-03-23 15h00 +00:00 Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.
7.8
High