Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
[
{
"digest": {
"length": 325.0,
"function_hash": "65792200794165758615890651797367375440"
},
"target": {
"file": "src/firejail/main.c",
"function": "detect_allow_debuggers"
},
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2017-5206-66366121",
"source": "https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"54599638741106254987302327452253934160",
"33607893010149723093548560133734141643",
"240378706286755339177978268301134147669",
"338742974002775008775820326758804651198",
"48639820909732886781516077881910579693",
"38338447638600750539827456274630738234",
"151420242146240698399504753220659614634",
"190608544414440206834505349026983060588"
]
},
"target": {
"file": "src/firejail/main.c"
},
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2017-5206-6d0d65a2",
"source": "https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e",
"deprecated": false
}
]