| Vulnerability Name: | CVE-2021-26910 (CCN-196411) | ||||||||||||
| Assigned: | 2021-02-08 | ||||||||||||
| Published: | 2021-02-08 | ||||||||||||
| Updated: | 2022-05-23 | ||||||||||||
| Summary: | Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. | ||||||||||||
| CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-367 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-26910 Source: MLIST Type: Exploit, Mailing List, Patch, Third Party Advisory [oss-security] 20210209 Re: [cve-pending] Firejail: root privilege escalation in OverlayFS code Source: XF Type: UNKNOWN firejail-cve202126910-sec-bypass(196411) Source: MISC Type: Patch, Third Party Advisory https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b Source: MISC Type: Release Notes, Third Party Advisory https://github.com/netblue30/firejail/releases/tag/0.9.64.4 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20210211 [SECURITY] [DLA 2554-1] firejail security update Source: CCN Type: Packet Storm Security [02-19-2021] Firejail TOCTOU Race Condition Source: GENTOO Type: Third Party Advisory GLSA-202105-19 Source: MISC Type: Exploit, Third Party Advisory https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/ Source: CCN Type: UNPAR-2021-0 Firejail: Insecure Use of OverlayFS as Sandbox File System Source: MISC Type: Exploit, Third Party Advisory https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt Source: DEBIAN Type: Third Party Advisory DSA-4849 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| Oval Definitions | |||||||||||||
| |||||||||||||
| BACK | |||||||||||||