firejail 0.9.38-1ubuntu0.1 source package in Ubuntu

Changelog

firejail (0.9.38-1ubuntu0.1) xenial-security; urgency=low

  * SECURITY UPDATE: sandbox escape via TIOCSTI ioctl (LP: #1655136)
    - debian/patches/CVE-2016-9016.patch: cherry-picked from upstream
      0.9.38-LTS branch (commit 19302eb)
    - CVE-2016-9016
  * SECURITY UPDATE: truncate /etc/resolv.conf as non-root user (LP: #1655136)
    - debian/patches/CVE-2016-10118.patch: cherry-picked from upstream
      0.9.38-LTS branch (commit 4f4e59c)
    - CVE-2016-10118
  * SECURITY UPDATE: local privilege escalation to root (LP: #1655136)
    - debian/patches/CVE-2017-5180.patch: cherry-picked from upstream
      0.9.38-LTS branch (commit ad97545)
    - CVE-2017-5180

 -- Reiner Herrmann <email address hidden>  Tue, 17 Jan 2017 20:16:26 +0100

Upload details

Uploaded by:
Reiner Herrmann
Sponsored by:
Marc Deslauriers
Uploaded to:
Xenial
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
utils
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Xenial security universe misc

Downloads

File Size SHA-256 Checksum
firejail_0.9.38.orig.tar.bz2 153.9 KiB b61b15c03a30b92f5ffddc458b6488eedd1cf87ffe22d77d423e5a254efd16bb
firejail_0.9.38-1ubuntu0.1.debian.tar.xz 5.6 KiB 4a1faa6443ff1d7cf0b9f486377d17ff13c85e861df2d3f70d870fbd80d182f8
firejail_0.9.38-1ubuntu0.1.dsc 1.7 KiB 3e2238d43042b907b0ba432ae70232bad1dc2b083b8a5c1e7b9b2e8d7137054c

View changes file

Binary packages built by this source

firejail: sandbox to restrict the application environment

 Firejail is a SUID security sandbox program that reduces the risk of
 security breaches by restricting the running environment of untrusted
 applications using Linux namespaces and seccomp-bpf. It allows a
 process and all its descendants to have their own private view of the
 globally shared kernel resources, such as the network stack, process
 table, mount table.

firejail-dbgsym: debug symbols for package firejail

 Firejail is a SUID security sandbox program that reduces the risk of
 security breaches by restricting the running environment of untrusted
 applications using Linux namespaces and seccomp-bpf. It allows a
 process and all its descendants to have their own private view of the
 globally shared kernel resources, such as the network stack, process
 table, mount table.