6.9
CVSSv2

CVE-2021-26910

Published: 08/02/2021 Updated: 23/05/2022
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 615
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Firejail prior to 0.9.64.4 allows malicious users to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

firejail project firejail

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Roman Fiedler discovered a vulnerability in the OverlayFS code in firejail, a sandbox program to restrict the running environment of untrusted applications, which could result in root privilege escalation This update disables OverlayFS support in firejail For the stable distribution (buster), this problem has been fixed in version 09582-2+deb1 ...
Firejail before 09644 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation ...

Github Repositories

https://github.com/netblue30/firejail.git

Firejail Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table,

Firejail Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount

Linux namespaces and seccomp-bpf sandbox

Firejail Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table,