mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1921] few questions about firejail #1286
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1286
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @justme55432 on GitHub (May 3, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1921
first of all thank you guys for the great job on develop firejail i wanted to ask few questions that i didn't find online.
If attacker know i use firejail on chrome can he target the fairjail rather than the browser to find vulnerabilities, and use it to try hack my system ?
What are the chances that firejail contain high risk vulnerabilities than the software it try to protect the system of, e.g chrome browser. ?
If i use firejail on chrome and hacker find exploit in chrome and use it to gain access to whatever he can inside firejail restriction, when i remove and reinstall chrome did the hacker exploit session remove with it, and the hacker start in point 0 or whatever he was before taking advantage of the exploit ?
Or refer to question 3 the only way is to reinstall the OS ? and i mean in both of the question using the firejail as the default command : firejail google-stable and not firejail -private google-stable.
thanks in advance and i apologize for my bad English.
hope you can understand if not i will try to rephrase the question,
@Fred-Barclay commented on GitHub (May 3, 2018):
G'day @justme55432 ! I'll do my best to answer, but some of these are just my opinion. 😄
Yes, the attacker could target firejail specifically. After starting the sandbox, though, firejail "goes to sleep" so to speak, meaning that by the time Chrome starts firejail is (mostly) inactive. It should be much harder to attack firejail.
The only "attacks" for firejail that I've seen to date (and they were all proof-of-concept demos rather than real-life attacks) relied on running the proof-of-concept directly through firejail, rather than running the proof-of-concept through a program that was started with firejail.
There are no known vulnerabilities in firejail that I'm aware of. We try to be very responsive on patching any known vulnerabilities as soon as they are disclosed.
You can see a list of past vulnerabilities in https://firejail.wordpress.com/download-2/cve-status/
Our Chrome profile is pretty restrictive, so most likely removing the whitelisted folders in the profile would be enough. Certainly for an unskilled, drive-by attack I would feel confident with this approach.
It's hard to prove a universal negative though -- possibly a dedicated attacker could manage to break out of firejail, though I am not aware of any methods to do this.
Cheers!
Fred