mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6445] firefox: Warning: I can run programs in /run/user/1000 #3274
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3274
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Utini2000 on GitHub (Aug 23, 2024).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6445
Hi all,
I noticed that jailcheck reports for firefox with the stock firefox.profile (not modifications):
I think this might be due using PSD (profile daemon sync) and having the whole firefox profile in tmpfs.
Adding "noexec /run/user/1000/" didn't help.
But I guess it should not be possible for firefox to exec something in /run/user/1000/ for security reasons?
@rusty-snake commented on GitHub (Aug 23, 2024):
e8b693c814/etc/profile-a-l/firefox-common.profile (L12)@Utini2000 commented on GitHub (Aug 24, 2024):
@rusty-snake thanks for the hint! I can't recall enabling it manually, shouldn't it be disabled out of the box for security reasons?
@rusty-snake commented on GitHub (Aug 24, 2024):
It is disabled by default
e8b693c814/etc/firejail.config (L22-L23)@Utini2000 commented on GitHub (Aug 28, 2024):
Thanks!