Debian Security Advisory
DLA-2336-1 firejail -- LTS security update
- Date Reported:
- 22 Aug 2020
- Affected Packages:
- firejail
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-17367, CVE-2020-17368.
- More information:
-
Tim Starling discovered two vulnerabilities in firejail, a sandbox program to restrict the running environment of untrusted applications.
- CVE-2020-17367
It was reported that firejail does not respect the end-of-options separator ("--"), allowing an attacker with control over the command line options of the sandboxed application, to write data to a specified file.
- CVE-2020-17368
It was reported that firejail when redirecting output via --output or --output-stderr, concatenates all command line arguments into a single string that is passed to a shell. An attacker who has control over the command line arguments of the sandboxed application could take advantage of this flaw to run run arbitrary other commands.
For Debian 9 stretch, these problems have been fixed in version 0.9.44.8-2+deb9u1.
We recommend that you upgrade your firejail packages.
For the detailed security status of firejail please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firejail
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2020-17367