Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 31 Jan 2017 19:21:58 +0100
From: Thomas Deutschmann <whissi@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: Re: Firejail local root exploit

On 2017-01-29 14:14, Ion Ionescu wrote:
> The first fix for CVE-2017-5180 in Firejail version 0.9.44.4 and
> 0.9.38.8 (LTS) was incomplete. Changing .Xauthority to .bashrc in the
> exploit code, the problem is still there - credit Sebastian Krahmer. 
> New releases are out: 0.9.44.8 and 0.9.38.10 (LTS). Please assign a
> new CVE.

Associated commits which already appeared in v0.9.44.6:

https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f
https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863

Backport for v0.9.38.10:

https://github.com/netblue30/firejail/commit/903fd8a0789ca3cc3c21d84cd0282481515592ef


-- 
Regards,
Thomas Deutschmann / Gentoo Security Team
C4DD 695F A713 8F24 2AA1  5638 5849 7EE5 1D5D 74A5



Download attachment "signature.asc" of type "application/pgp-signature" (952 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.