Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 9 Feb 2021 07:36:15 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: [cve-pending] Firejail: root privilege escalation
 in OverlayFS code

Hi,

On Mon, Feb 08, 2021 at 02:15:05PM +0000, netblue30 wrote:
> 
> Security Advisory - Feb 8, 2021
> 
> Summary: A vulnerability resulting in root privilege escalation was discovered in Firejail's OverlayFS code,
> 
> Versions affected: Firejail software versions starting with 0.9.30.
> Long Term Support (LTS) Firejail branch is not affected by this bug.
> 
> Workaround: Disable overlayfs feature at runtime. In a text editor open /etc/firejail/firejail.config file,
> and set "overlayfs" entry to "no".
> 
>       $ grep overlayfs /etc/firejail/firejail.config
>       # Enable or disable overlayfs features, default enabled.
>       overlayfs no
> 
> Fix: The bug is fixed in Firejail version 0.9.64.4
> 
> GitHub commit: (file configure.ac)
> https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
> 
> Credit:  Security researcher Roman Fiedler analyzed the code and discovered the vulnerability.
> Functional PoC exploit code was provided to Firejail development team.
> A description of the problem is here on Roman's blog:
> 
> https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
> https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/

CVE-2021-26910 was assigned for this issue according to
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26910 .

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.