Name | CVE-2021-26910 |
Description | Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2554-1, DSA-4849-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
firejail (PTS) | stretch (security), stretch (lts), stretch | 0.9.58.2-2+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 0.9.58.2-2+deb10u3 | fixed |
| bullseye (security), bullseye | 0.9.64.4-2+deb11u1 | fixed |
| sid, bookworm | 0.9.72-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://www.openwall.com/lists/oss-security/2021/02/08/5
Fix (disabled overlayfs): https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/