Firejail is vulnerable to access control bypass. A TOCTOU race condition between a stat operation and an OverlayFS mount operation allows an attacker to bypass access controls.
CPE | Name | Operator | Version |
---|---|---|---|
firejail:sid | eq | 0.9.64-1 | |
firejail:buster | eq | 0.9.58.2-2+deb10u1 | |
firejail:bullseye | eq | 0.9.64-1 | |
firejail:3.13 | eq | 0.9.64-r0 |
www.openwall.com/lists/oss-security/2021/02/09/1
github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
github.com/netblue30/firejail/releases/tag/0.9.64.4
lists.debian.org/debian-lts-announce/2021/02/msg00015.html
security-tracker.debian.org/tracker/CVE-2021-26910
security.gentoo.org/glsa/202105-19
unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/
unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
www.debian.org/security/2021/dsa-4849