7.2
CVSSv2

CVE-2022-31214

Published: 09/06/2022 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A Privilege Context Switching issue exists in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS prctl is not activated, and the entered mount namespace is under the attacker's control. In this way, the filesystem layout can be adjusted to gain root privileges through execution of available setuid-root binaries such as su or sudo.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

firejail project firejail 0.9.68

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1012510 firejail: CVE-2022-31214: local root exploit reachable via --join logic Package: src:firejail; Maintainer for src:firejail is Reiner Herrmann <reiner@reiner-hde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 8 Jun 2022 14:54:02 UTC Severity: grave Tags: security ...
Matthias Gerstner discovered that the --join option of Firejail, a sandbox to restrict an application environment, was susceptible to local privilege escalation to root For the oldstable distribution (buster), this problem has been fixed in version 09582-2+deb10u3 For the stable distribution (bullseye), this problem has been fixed in version 0 ...