CVE-2016-10122 log
| Source |
|
| Severity | High |
| Remote | No |
| Type | Privilege escalation |
| Description | A vulnerability has been found in firejail where the --x11 flag runs an X server as root and the --env flag could be used to set arbitrary environment variables. This skips runtime linker protections, for example LD_* variables for setuid executables. Therefore a non-privileged user could pop a root shell via hooking calls to getenv(3) in xauth(1). |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-128 | firejail | 0.9.44.2-1 | 0.9.44.10-1 | High | Fixed |
| Notes |
|---|
Bugfixes: https://github.com/netblue30/firejail/commit/e847207df28e181a8f590ade825b5f06d4fadf17 https://github.com/netblue30/firejail/commit/18f6e9dc9b304f7aca291c3edce5122562b1e36c |