In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firejail | Firejail_project | * | 0.9.60 (excluding) |
Firejail | Ubuntu | bionic | * |
Firejail | Ubuntu | cosmic | * |
Firejail | Ubuntu | devel | * |
Firejail | Ubuntu | disco | * |
Firejail | Ubuntu | eoan | * |
Firejail | Ubuntu | esm-apps/bionic | * |
Firejail | Ubuntu | esm-apps/xenial | * |
Firejail | Ubuntu | focal | * |
Firejail | Ubuntu | groovy | * |
Firejail | Ubuntu | hirsute | * |
Firejail | Ubuntu | impish | * |
Firejail | Ubuntu | jammy | * |
Firejail | Ubuntu | kinetic | * |
Firejail | Ubuntu | lunar | * |
Firejail | Ubuntu | mantic | * |
Firejail | Ubuntu | noble | * |
Firejail | Ubuntu | oracular | * |
Firejail | Ubuntu | trusty | * |
Firejail | Ubuntu | upstream | * |
Firejail | Ubuntu | xenial | * |