By default, jailed processes cannot mount filesystems,...
High severity
Unreviewed
Published
Mar 9, 2026
to the GitHub Advisory Database
•
Updated Mar 10, 2026
Description
Published by the National Vulnerability Database
Mar 9, 2026
Published to the GitHub Advisory Database
Mar 9, 2026
Last updated
Mar 10, 2026
By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks.
If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail.
In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escape the jail's filesystem root.
References