mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2195] Chromium sys_chroot and sys_admin permissions #1470
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1470
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Zypherspace on GitHub (Oct 14, 2018).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2195
Chrome and Chromium firejail profiles enable sys_chroot and sys_admin kernel privileges. Is it possible to disable these by disabling Chrome's internal sandbox, or any other method?
@Vincent43 commented on GitHub (Oct 14, 2018):
Chrome sandbox is considered one of the best in industry. Disabling it will negatively impact security. Those privileges are available only for parent process, not for those exposed to web browsing.
@curiosity-seeker commented on GitHub (Oct 15, 2018):
@Zypherspace : Distros with newer kernels don't require that anymore.
My profile (on Fedora 28) contains:
You can try if this works for you. It's possible that the list of necessary syscalls for your distro differs a bit. This guide helps to find out.
@Vincent43 commented on GitHub (Oct 15, 2018):
I think it rather depends on unprivileged user namespaces being available. In that case
/usr/lib/chromium/chrome-sandbox( or whatever it's named) can be build non-setuid. Otherwise those caps are necessary. As some distros like Debian or Arch disable unprivileged user namespaces in default configuration we cannot change it in firejail profile.@Zypherspace commented on GitHub (Oct 15, 2018):
Great, In Fedora 28 Chromium is working with --caps.drop=all.
I still see
Warning: an existing sandbox was detected. /usr/bin/chromium-browser will run without any additional sandboxing features, but that reports even with the default Chromium.profileabout:sandboxin Chromium reports normal sandboxing.