PatchSiren cyber security CVE debrief
CVE-2017-5940 Firejail Project CVE debrief
CVE-2017-5940 was publicly disclosed on 2017-02-09 and describes a Firejail sandbox escape issue caused by incomplete dotfile handling while trying to block access to user files with an euid of zero. The record states that local users could leverage a symlink and the --private option to bypass containment, and that the flaw existed because of an incomplete fix for CVE-2017-5180.
- Vendor
- Firejail Project
- Product
- CVE-2017-5940
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-09
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-09
- Advisory updated
- 2026-05-13
Who should care
Administrators and users running Firejail in environments that rely on local sandboxing, especially those using affected 0.9.38.x LTS or 0.9.40 through 0.9.44.6 releases and the --private option.
Technical summary
NVD classifies the issue as CVE-2017-5940 with CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H and CWE-269. The vulnerability affects Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS. According to the record, Firejail did not comprehensively address dotfile cases in its attempt to prevent access to user files with euid 0, allowing a local attacker to conduct a sandbox-escape attack via a symlink and the --private option. The issue is described as an incomplete fix for CVE-2017-5180.
Defensive priority
High. The issue is local, but the impact is broad because a successful escape can compromise confidentiality, integrity, and availability within the sandbox boundary.
Recommended defensive actions
- Upgrade Firejail to a fixed release at or above 0.9.44.6, or 0.9.38.10 LTS for the LTS line.
- Audit systems to identify any deployments still using affected Firejail versions.
- Review uses of the --private option and verify that containment assumptions are still valid after upgrading.
- Track vendor release notes and linked patches to confirm the remediation path used in your environment.
- Prioritize patching on systems where untrusted local users can run code or where Firejail is used to isolate higher-risk applications.
Evidence notes
The official CVE record and NVD entry identify the affected version ranges, the CVSS score/vector, and the local attack model. The vendor release notes, mailing list reference, and linked commits are included in the source corpus as remediation evidence. The description explicitly ties this issue to incomplete handling of dotfiles and to the earlier CVE-2017-5180 fix.
Official resources
-
CVE-2017-5940 CVE record
CVE.org
-
CVE-2017-5940 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed on 2017-02-09 in the CVE/NVD record, with vendor and patch references listed in the official source corpus.