Linux Security
    Linux Security
    Linux Security

    Debian: DSA-4849-1: firejail security update

    Date 09 Feb 2021
    107
    Posted By LinuxSecurity Advisories
    Roman Fiedler discovered a vulnerability in the OverlayFS code in firejail, a sandbox program to restrict the running environment of untrusted applications, which could result in root privilege escalation. This update disables OverlayFS support in firejail.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4849-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    February 09, 2021                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : firejail
    CVE ID         : CVE-2021-26910
    
    Roman Fiedler discovered a vulnerability in the OverlayFS code in
    firejail, a sandbox program to restrict the running environment of
    untrusted applications, which could result in root privilege escalation.
    This update disables OverlayFS support in firejail.
    
    For the stable distribution (buster), this problem has been fixed in
    version 0.9.58.2-2+deb10u2.
    
    We recommend that you upgrade your firejail packages.
    
    For the detailed security status of firejail please refer to its
    security tracker page at:
    https://security-tracker.debian.org/tracker/firejail
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.