CVE-2020-17368

NameCVE-2020-17368
DescriptionFirejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2336-1, DSA-4742-1, DSA-4767-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firejail (PTS)stretch (security), stretch (lts), stretch0.9.58.2-2+deb9u1fixed
buster, buster (security)0.9.58.2-2+deb10u3fixed
bullseye (security), bullseye0.9.64.4-2+deb11u1fixed
sid, trixie, bookworm0.9.72-2fixed
mediawiki (PTS)buster1:1.31.16-1+deb10u2fixed
buster (security)1:1.31.16-1+deb10u7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firejailsourcestretch0.9.44.8-2+deb9u1DLA-2336-1
firejailsourcebuster0.9.58.2-2+deb10u1DSA-4742-1
firejailsource(unstable)0.9.62-4
mediawikisourcebuster1:1.31.10-1~deb10u1DSA-4767-1

Notes

https://phabricator.wikimedia.org/T258763
https://github.com/netblue30/firejail/commit/34193604fed04cad2b7b6b0f1a3a0428afd9ed5b
https://phabricator.wikimedia.org/T257062
https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory

Search for package or bug name: Reporting problems