MGASA-2020-0328

Source
https://advisories.mageia.org/MGASA-2020-0328.html
Import Source
https://advisories.mageia.org/MGASA-2020-0328.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0328
Related
Published
2020-08-18T17:41:27Z
Modified
2020-08-18T16:51:39Z
Summary
Updated firejail packages fix security vulnerability
Details

It was reported that firejail does not respect the end-of-options separator ("--"), allowing an attacker with control over the command line options of the sandboxed application, to write data to a specified file (CVE-2020-17367).

It was reported that firejail when redirecting output via --output or --output-stderr, concatenates all command line arguments into a single string that is passed to a shell. An attacker who has control over the command line arguments of the sandboxed application could take advantage of this flaw to run arbitrary commands (CVE-2020-17368).

References
Credits

Affected packages

Mageia:7 / firejail

Package

Name
firejail
Purl
pkg:rpm/mageia/firejail?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.56-2.2.mga7

Ecosystem specific

{
    "section": "core"
}