CVE-2021-26910 and --overlay-tmpfs
#4178
Replies: 10 comments 9 replies
-
Ping @netblue30. I think one of the reasons to just disable I don't know why it fails on your Xubuntu, which still has a vulnerable version. Maybe the exploit code is not flexible enough. |
Beta Was this translation helpful? Give feedback.
-
Just happened on #4006 (comment) -
Does this mean the answer to my question (1) is I'm not vulnerable? |
Beta Was this translation helpful? Give feedback.
-
Hi, with 0.9.66 now on the way to release, it would be awesome to have an answer to this, especially if |
Beta Was this translation helpful? Give feedback.
-
It seems @netblue30 is too busy to even respond to this, and no one is contradicting #4178 (reply in thread) which basically says
Would this be reasonable? |
Beta Was this translation helpful? Give feedback.
-
Hi, any news on this? Unfortunately I don't have enough C knowledge to pull request the proposal in #4178 (comment) myself. Could this be done before or soon after the upcoming 0.9.68 release? If not, since my particular systems are not affected by the vulnerability, will I need to just manually revert that part of fb9f2a5 for my local builds for now to update firejail beyond 0.9.64 without losing the important |
Beta Was this translation helpful? Give feedback.
-
Is there any news regarding a fix for the overlays feature in firejail. I need a tool that lets me run processes as if they were on the host machine but captures all changes that were made to the filesystem in a different folder. Firejail seemed to be able to do this until the option got remvoed. |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
|
Beta Was this translation helpful? Give feedback.
-
I know that as an emergency fix for this CVE, firejail disabled all the overlay-related features, "fixes pending" - fb9f2a5
As I depend on extensive use of
--overlay-tmpfs
, and this is still disabled / fixes still pending, this became very concerning.Sorry I'm a bit late asking about this (been busy), but looking at and testing with the publicly available exploit code, I gather that:
Exploiting this vulnerability is not done from inside the firejail sandbox. It is done by a malicious program invoking firejail from outside a sandbox.
The vulnerability is specifically with the overlay features that mount (persistent) overlays inside the home directory. (which I don't use)
Is this assessment correct?
Also I have two questions:
And these overlay features are broken anyway:
Does it mean my setup is not vulnerable?
--overlay-tmpfs
mounts in a firejail-controlled, root-owned subdirectory of/run
, is it immune to this vuln? If so, could you please restore the--overlay-tmpfs
while keeping the other, still-vulnerable overlay features disabled (and thus keeping this vulnerability closed)?Thanks!
Relates to:
Beta Was this translation helpful? Give feedback.
All reactions