mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #869] Can you use dirtycow to break out of firejail? [ QUESTION] #591
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#591
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @suedi on GitHub (Oct 23, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/869
Can you use dirtycow to break out of firejail?
DirtyCow as in https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
@Fred-Barclay commented on GitHub (Oct 23, 2016):
I'm working on testing that in a VM. 😄
@reinerh commented on GitHub (Oct 23, 2016):
The ptrace-based exploits are prevented with "firejail --seccomp", as this drops ptracing by default.
When --apparmor is used with the default apparmor firejail profile, there should also no access to /proc/self/mem, so those would also not work.
You could also try adding madvise to the list of syscalls dropped with seccomp for additional protection, though I'm not sure how often this is used legitimately.
@netblue30 commented on GitHub (Oct 25, 2016):
I would say you need to update the kernel.
@suedi commented on GitHub (Oct 26, 2016):
Yeah, that's wot I wos fraid of now I have to find time to re-compile the kernel :(
closing...
@Fred-Barclay commented on GitHub (Oct 26, 2016):
@suedi What distro are you using?
I know that Debian and Ubuntu (and Mint) have already got the fixes in their repos, so no need to recompile if you use either. I suspect most other distros that use installable binaries have updates too, so unless you use a distro that requires you to recompile you shouldn't have to.
@suedi commented on GitHub (Oct 27, 2016):
Yeah, on my rpi I already updated but on my other comps
I roll my own with AUFS patches so will need to re-compile me thinks