[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-31214Date: (C)2022-06-10   (M)2023-12-22


A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS prctl is not activated, and the entered mount namespace is under the attacker's control. In this way, the filesystem layout can be adjusted to gain root privileges through execution of available setuid-root binaries such as su or sudo.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score : 7.2
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 5.9Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-5167
FEDORA-2022-7ecd36b131
FEDORA-2022-827d9ce8ac
FEDORA-2022-e8e9b50a33
GLSA-202305-19
https://lists.debian.org/debian-lts-announce/2022/06/msg00023.html
https://firejail.wordpress.com/download-2/release-notes/
https://www.openwall.com/lists/oss-security/2022/06/08/10

CPE    1
cpe:/o:debian:debian_linux:9.0
CWE    1
CWE-269
OVAL    5
oval:org.secpod.oval:def:608441
oval:org.secpod.oval:def:86397
oval:org.secpod.oval:def:124191
oval:org.secpod.oval:def:124194
...

© SecPod Technologies