CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Firejail Project : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2021-26910 367 Bypass 2021-02-08 2021-05-26
6.9
None Local Medium Not required Complete Complete Complete
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
2 CVE-2020-17368 78 2020-08-11 2021-01-10
7.5
None Remote Low Not required Partial Partial Partial
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
3 CVE-2020-17367 78 2020-08-11 2021-01-10
4.6
None Local Low Not required Partial Partial Partial
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
4 CVE-2019-12589 732 2019-06-03 2020-08-24
4.6
None Local Low Not required Partial Partial Partial
In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
5 CVE-2019-12499 2019-05-31 2020-08-24
9.3
None Remote Medium Not required Complete Complete Complete
Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the --shutdown control command). This is similar to CVE-2019-5736.
6 CVE-2017-5940 269 2017-02-09 2019-10-03
4.6
None Local Low Not required Partial Partial Partial
Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
7 CVE-2017-5207 269 +Priv 2017-03-23 2019-10-03
7.2
None Local Low Not required Complete Complete Complete
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.
8 CVE-2017-5180 862 2017-02-09 2019-10-03
4.6
None Local Low Not required Partial Partial Partial
Firejail before 0.9.44.4 and 0.9.38.x LTS before 0.9.38.8 LTS does not consider the .Xauthority case during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option.
9 CVE-2016-10123 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges.
10 CVE-2016-10122 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail does not properly clean environment variables, which allows local users to gain privileges.
11 CVE-2016-10121 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges.
12 CVE-2016-10120 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges.
13 CVE-2016-10119 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail uses 0777 permissions when mounting /tmp, which allows local users to gain privileges.
14 CVE-2016-10118 264 2017-04-13 2017-04-19
2.1
None Local Low Not required None Partial None
Firejail allows local users to truncate /etc/resolv.conf via a chroot command to /.
15 CVE-2016-10117 264 +Priv 2017-04-13 2017-04-19
7.2
None Local Low Not required Complete Complete Complete
Firejail does not restrict access to --tmpfs, which allows local users to gain privileges, as demonstrated by mounting over /etc.
16 CVE-2016-9016 284 Exec Code 2017-01-19 2017-06-08
7.2
None Local Low Not required Complete Complete Complete
Firejail 0.9.38.4 allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
Total number of vulnerabilities : 14   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.