CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. | 7.8 |
High |
||
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection. | 9.8 |
Critical |
||
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection. | 7.8 |
High |
||
Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument. | 9 |
Critical |
||
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument. | 7.8 |
High |