Replies: 4 comments 14 replies
-
If I understand correctly these zero-days relate to XSLT and WebGPU IPC. According to my Firefox about:support page WebGPU is disabled by default, 'blocked by runtime: WebGPU can only be enabled in nightly' and dom.webgpu.enabled is set to 'false'. For the XSLT bug I don't know any FF-internal settings. IMO combining more secure app-internal settings in tandem with Firejail is the better way to go about these potential exploits. Regarding the WebGPU IPC bug Firejail might offer extra protection via its Blacklisting more directories is obviously always possible with Firejail. Our Firefox profiles are already designed as 'whitelisting' profiles though. These are more restrictive by design and only allow access to parts of the filesystem that have been explicitly configured. So IMO there's not much protection to be gained - if any - by more blacklisting. |
Beta Was this translation helpful? Give feedback.
-
Thanks for the detailed answer! As for blacklisting, I was wondering if denying other directories is beneficial?! For example Firejail itself warns that |
Beta Was this translation helpful? Give feedback.
-
Firejail can help if an attacker expolits these vulnerabilities and can run arbitrary code with the privileges of the main firefox process by limiting these privileges. |
Beta Was this translation helpful? Give feedback.
-
Firejail can't protect from use-after-free vulnerabilities. Its protections may be able to limit the Firefox exploit but not for example if there's also vulnerabilities with the kernel like Dirty Pipe. A memory allocator, which aggressively unmaps freed memory from process' address space during free() might be able to help, it would make the program crash instead of allowing the exploit to continue. Perhaps one day libaslrmalloc would be able to help in some cases but Firefox may still need recompiling to not use its bundled malloc implementation. |
Beta Was this translation helpful? Give feedback.
-
There has been a recent Mozilla Firefox vulnerability
https://www.bleepingcomputer.com/news/security/mozilla-firefox-9702-fixes-two-actively-exploited-zero-day-bugs/
How much is the current firejail configuration helpful in containing this attack?
If not, is there any configuration I could add to prevent attacks from such bugs? Maybe blacklisting more directories?
Beta Was this translation helpful? Give feedback.
All reactions