Skip to content

Commit

Permalink
Merge pull request #5290 from kmk3/docs-suid-firejail-users
Browse files Browse the repository at this point in the history
docs: mention risk of SUID binaries and also firejail-users(5)
  • Loading branch information
netblue30 authored Aug 14, 2022
2 parents c4e2ee9 + ba0ac27 commit e7dccf7
Showing 1 changed file with 11 additions and 0 deletions.
11 changes: 11 additions & 0 deletions src/man/firejail.txt
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,17 @@ Firejail allows the user to manage application security using security profiles.
Each profile defines a set of permissions for a specific application or group
of applications. The software includes security profiles for a number of more common
Linux programs, such as Mozilla Firefox, Chromium, VLC, Transmission etc.
.\" TODO: Explain the security/usability tradeoffs from #4601.
.PP
Firejail is currently implemented as an SUID binary, which means that if a
malicious or compromised user account manages to exploit a bug in Firejail,
that could ultimately lead to a privilege escalation to root.
To mitigate this, it is recommended to only allow trusted users to run firejail
(see firejail-users(5) for details on how to achieve that).
For more details on the security/usability tradeoffs of Firejail, see:
.UR https://github.com/netblue30/firejail/discussions/4601
#4601
.UE
.PP
Alternative sandbox technologies like snap (https://snapcraft.io/) and flatpak (https://flatpak.org/)
are not supported. Snap and flatpak packages have their own native management tools and will
Expand Down

0 comments on commit e7dccf7

Please sign in to comment.