mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3552] Does changing $PATH affect the security? #2232
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2232
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @TheEvilSkeleton on GitHub (Jul 26, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3552
Hello, I've had an argument with someone about Firejail. He claimed that any attacker can easily change the $PATH to disable Firejail, and then said that Firejail does more harm than good:
Is his claim about changing $PATH true?
Will it actually harm even more than running a program normally?
@rusty-snake commented on GitHub (Jul 26, 2020):
@rusty-snake commented on GitHub (Jul 26, 2020):
Firejails initial commit:
d1af2f5ba7(August 2015)Last priv-esc CVE: https://www.cvedetails.com/cve/CVE-2017-5940/ (2017)
=> All +Priv CVEs were is the first two year, where firejail was a young project.
@TheEvilSkeleton commented on GitHub (Jul 26, 2020):
Well that was a fun read...
Closing the issue. That seems enough information for me to stay on Firejail. Thank you so much for the very quick responses!
@rusty-snake commented on GitHub (Jul 27, 2020):
To extend: On a desktop-system the most common way to get root is to map
sudoto an script which catch the password, because nobody verifies each time that he is executing/usr/bin/sudo. There is no need for 0-days if you have a user 🤓 .However why should an attacker on a desktop-system be interested in becoming root? Ransomware, spyware, botnets, ... all work with normal rights. They can access the internet (if connected), encrypt/delete/upload your files, access network shares, ...
You can additional harden firejail in
firejail.config(usually found in/etc/firejail):