Is firejail running after program invocation? Is it vulnerable at runtime? #6608
-
Is it correct that firejail is only active at the program start to drop its initial privilages, set namespaces and perform similar setup steps? Once this is finished does firejail terminate and program it setup is running autonomously without a "firejail layer" around it (security features coming from the kernel itself like namespeces, seccomp etc.)? I'm asking to evaluate risk of privilage escalation if a program tried to exploit any potential vulnerability in firejail. As mentioned many times before it runs as a suid program, which if exploited poses substantial risks, however if it turned out that firejail is no longer available after this initial setup that would reduce attack surface in my mind. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
Switch the order, setting up stuff requires privileges.
The answer is more complex then a simple yes/no. The main firejail processes continue to run. However they do not work as a broker/emulator/... and do real work, then Non-kernel runtime features include:
|
Beta Was this translation helpful? Give feedback.
Switch the order, setting up stuff requires privileges.
The answer is more complex then a simple yes/no.
The main firejail processes continue to run. However they do not work as a broker/emulator/... and do real work, then
wait
for the program to terminate.Non-kernel runtime features include:
dbus.{user,system} filter
:xdg-dbus-proxy
tr…