CVE-2022-31214Improper Privilege Management in Linux

Severity
7.8HIGHNVD
EPSS
0.1%
top 78.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateJun 10

Description

A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS prctl is not activated, and the entered mount namespace is under the attacker's control. In this way, the filesystem layout can be adjusted to gain root privileges through executi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianfirejail_project/firejail< 0.9.64.4-2+deb11u1+3

Also affects: Debian Linux 10.0, 9.0, Fedora 35, 36, 37

Patches

🔴Vulnerability Details

3
GHSA
GHSA-m2xv-wgqg-4gxh: A Privilege Context Switching issue was discovered in join2022-06-10
OSV
CVE-2022-31214: A Privilege Context Switching issue was discovered in join2022-06-09
CVEList
CVE-2022-31214: A Privilege Context Switching issue was discovered in join2022-06-09

📋Vendor Advisories

1
Debian
CVE-2022-31214: firejail - A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68....2022
CVE-2022-31214 — Improper Privilege Management in Linux | cvebase