Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2017/01/07/5 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/97120 - Third Party Advisory, VDB Entry | |
References | () https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51 - Third Party Advisory | |
References | () https://firejail.wordpress.com/download-2/release-notes/ - Release Notes, Vendor Advisory | |
References | () https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201701-62 - Patch, Third Party Advisory, VDB Entry |
Information
Published : 2017-03-23 16:59
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5206
Mitre link : CVE-2017-5206
CVE.ORG link : CVE-2017-5206
JSON object : View
Products Affected
firejail_project
- firejail
linux
- linux_kernel
CWE