Debian Security Advisory

DLA-2336-1 firejail -- LTS security update

Date Reported:
22 Aug 2020
Affected Packages:
firejail
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-17367, CVE-2020-17368.
More information:

Tim Starling discovered two vulnerabilities in firejail, a sandbox program to restrict the running environment of untrusted applications.

  • CVE-2020-17367

    It was reported that firejail does not respect the end-of-options separator ("--"), allowing an attacker with control over the command line options of the sandboxed application, to write data to a specified file.

  • CVE-2020-17368

    It was reported that firejail when redirecting output via --output or --output-stderr, concatenates all command line arguments into a single string that is passed to a shell. An attacker who has control over the command line arguments of the sandboxed application could take advantage of this flaw to run run arbitrary other commands.

    For Debian 9 stretch, these problems have been fixed in version 0.9.44.8-2+deb9u1.

    We recommend that you upgrade your firejail packages.

    For the detailed security status of firejail please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firejail

    Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS