oss-sec mailing list archives

Re: CVE-2016-7545 -- SELinux sandbox escape


From: Yves-Alexis Perez <corsac () debian org>
Date: Tue, 25 Oct 2016 09:29:02 +0200

On Sun, 2016-09-25 at 13:49 +0200, up201407890 () alunos dcc fc up pt wrote:
When executing a program via the SELinux sandbox, the nonpriv session
can escape to the parent session by using the TIOCSTI ioctl to push
characters into the terminal's input buffer, allowing an attacker to
escape the sandbox.

Hi,

it seems that firejail was affected by the same vulnerability, which was fixed
in 0.9.44 with https://github.com/netblue30/firejail/commit/46dc2b34f1fbbc4597
b4ff9f6a3cb28b2d500d1b

The commit log reuses the CVE-2016-7545 number, but I guess a new one should
be assigned since they don't share the same codebase?

Regards,
-- 
Yves-Alexis Perez - Debian Security

Attachment: signature.asc
Description: This is a digitally signed message part


Current thread: