mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[PR #5537] [MERGED] add restrict-namespaces to (almost) all applicable profiles #5529
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#5529
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netblue30/firejail/pull/5537
Author: @smitsohu
Created: 12/20/2022
Status: ✅ Merged
Merged: 12/20/2022
Merged by: @netblue30
Base:
master← Head:restrict-namespaces-profiles📝 Commits (1)
e4f0f91add restrict-namespaces to (almost) all profiles📊 Changes
628 files changed (+967 additions, -13 deletions)
View changed files
📝
etc/profile-a-l/0ad.profile(+2 -0)📝
etc/profile-a-l/2048-qt.profile(+2 -0)📝
etc/profile-a-l/Cryptocat.profile(+2 -0)📝
etc/profile-a-l/Fritzing.profile(+1 -0)📝
etc/profile-a-l/JDownloader.profile(+2 -0)📝
etc/profile-a-l/abiword.profile(+2 -0)📝
etc/profile-a-l/agetpkg.profile(+1 -0)📝
etc/profile-a-l/akonadi_control.profile(+1 -0)📝
etc/profile-a-l/akregator.profile(+1 -0)📝
etc/profile-a-l/alacarte.profile(+1 -0)📝
etc/profile-a-l/alienarena.profile(+2 -0)📝
etc/profile-a-l/alpine.profile(+1 -0)📝
etc/profile-a-l/amarok.profile(+2 -0)📝
etc/profile-a-l/amule.profile(+1 -0)📝
etc/profile-a-l/android-studio.profile(+1 -0)📝
etc/profile-a-l/anki.profile(+2 -0)📝
etc/profile-a-l/anydesk.profile(+2 -0)📝
etc/profile-a-l/aosp.profile(+2 -0)📝
etc/profile-a-l/apktool.profile(+2 -0)📝
etc/profile-a-l/apostrophe.profile(+2 -0)...and 80 more files
📄 Description
Closes #5440
My algorithm was roughly as follows:
# Redirecttagseccompdirectiverestrict-namespacesifseccompis commented outrestrict-namespacesif there is aseccomp !chrootdirective, indicating use of a new user namespacerestrict-namespacesto all other profiles, including default.profile and server.profileThere are a few special cases, among them: basilisk.profile, palemoon.profile, fdns.profile, unbound.profile.
I didn't attempt for now to fit
restrict-namespacesto common browsers.🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.