Improper access control in firejail - CVE-2019-12589
Published: June 3, 2019 / Updated: August 8, 2020
Vulnerability identifier: #VU35862
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-12589
CWE-ID: CWE-284
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: firejail.wordpress.com
Affected software:
firejail
firejail
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
How to mitigate CVE-2019-12589
Install update from vendor's website.
Sources
- https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134
- https://github.com/netblue30/firejail/issues/2718
- https://github.com/netblue30/firejail/releases/tag/0.9.60
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CDY7B73YDRBURA25APSHD5PFEO4TNSFW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGVULJ6IKVDO6UAVIQRHQVSKOUD6QDWM/