Recent Releases
0.9.7213 Jan 2023 06:05
minor feature:
Feature: On failing to remount a fuse filesystem, give warning instead of.
Erroring out
Feature: Update syscall tables and seccomp groups.
Feature: improve force-nonewprivs security guarantees.
Feature: add support for restricting the creation of Linux namespaces.
(--restrict-namespaces, --restrict-namespaces=), implemented as a seccomp.
Filter for both 64 and 32 bit architectures
Feature: add support for custom AppArmor profiles (--apparmor=).
Feature: add support for ICMP in nettrace.
Feature: add --dnstrace, --icmptrace, and --snitrace commands.
Feature: Add basic gtksourceview language-spec (file type detection/syntax.
Highlighting for profiles)
Feature: add restrict-namespaces to (almost) all applicable profiles.
Feature: add support for netlock in profile files.
Modif: removed --cgroup= command.
Modif: set --shell=none as the default.
Modif: removed --shell= command.
Modif: disabled firetunnel by default in configure.ac.
Modif: disabled chroot by default in /etc/firejail/firejail.config.
Modif: disabled private-lib by default in /etc/firejail/firejail.config.
Modif: disabled tracelog by default in /etc/firejail/firejail.config.
Modif: removed grsecurity support.
Modif: disabled whitelisting for /dev directory.
: Flood of seccomp audit log entries.
: --netlock does not work (Error: no valid sandbox).
Build: deduplicate configure-time vars into new config files.
Build: file mode of shell scripts (644 - 755).
Build: reduce autoconf input files from 32 to 2.
Build: add dist build directory to.gitignore.
Build: add autoconf auto-generation comment to input files.
Build: Add files make uninstall forgot to remove.
Build: add and use TARNAME instead of NAME for paths.
Build: only install ids.config when --enable-ids is set.
Build: Remove deprecated syntax and modernize shell test scripts.
Build: musl warnings.
Build: sort.py improvements.
Build: deduplicate makefiles.
Build: formatting and misc in configure.
Build: actually set LDFL
0.9.72rc120 Dec 2022 03:26
minor feature:
Work in progress.
Feature: On failing to remount a fuse filesystem, give warning instead of.
Erroring out
Feature: Update syscall tables and seccomp groups.
Feature: improve force-nonewprivs security guarantees.
Feature: restrict namespaces (--restrict-namespaces) implemented as
a seccomp filter for both 64 and 32 bit architectures.
Feature: support for custom AppArmor profiles (--apparmor=).
Feature: added support for ICMP in nettrace.
Feature: --dnstrace, --icmptrace, and --snitrace.
Modif: removed --cgroup= command.
Modif: set --shell=none as the default.
Modif: removed --shell= command.
Modif: disabled firetunnel by default in configure.ac.
Modif: disabled chroot by default in /etc/firejail/firejail.config.
Modif: disabled private-lib by default in /etc/firejail/firejail.config.
Modif: disabled tracelog by default in /etc/firejail/firejail.config.
Modif: removed grsecurity support.
: Flood of seccomp audit log entries.
Build: deduplicate configure-time vars into new config files.
Build: file mode of shell scripts (644 - 755).
Build: reduce autoconf input files from 32 to 2.
Build: add dist build directory to.gitignore.
Build: add autoconf auto-generation comment to input files.
Build: Add files make uninstall forgot to remove.
Build: add and use TARNAME instead of NAME for paths.
Build: only install ids.config when --enable-ids is set.
Build: Remove deprecated syntax and modernize shell test scripts.
Build: musl warnings.
Build: sort.py improvements.
Build: deduplicate makefiles.
Build: formatting and misc in configure.
Build: actually set LDFLAGS/LIBS stop overriding CFLAGS/LDFLAGS.
ci: bump ubuntu to 22.04 and use newer compilers / analyzers.
ci: ignore git-related paths and the project license.
ci: Harden GitHub Actions (StepSecurity).
ci: sort and ignore more paths.
ci: whitelist needed endpoints and block access to sudo.
Docs: typos.
Docs: mention risk of SUID binaries and also firejail-users(5).
Docs: s
0.9.7010 Jun 2022 06:45
minor bugfix:
Security: CVE-2022-31214 - root escalation in --join logic
Reported by Matthias Gerstner, working exploit code was provided to our.
Development team. In the same time frame, the problem was independently
Reported by Birk Blechschmidt. Full working exploit code was also provided.
Feature: enable shell tab completion with --tab.
Feature: disable user profiles at compile time.
Feature: Allow resolution of.local names with avahi-daemon in the apparmor.
Profile
Feature: always log seccomp errors.
Feature: firecfg --guide, guided user configuration.
Feature: --oom, kernel OutOfMemory-killer.
Modif: --ids feature needs to be enabled at compile time.
Modif: --nettrace only available to root user.
Rework: whitelist restructuring.
Rework: firemon, speed up and lots of : --private-cwd not expanding macros, broken hyperrogue.
: nogroups + wrc prints confusing messages.
: openSUSE Leap - whitelist-run-common.inc.
: printing in evince.
: gcov: gcov functions always declared as dummy.
: Stop warning on safe supplementary group clean.
Build: remove ultimately unused INSTALL and RANLIB check macros.
Build: mkdeb.sh.in: pass remaining arguments to./configure.
ci: replace centos (EOL) with almalinux.
ci: --version not printing compile-time features.
ci: print version after install apparmor support on build_apparmor.
Docs: Refer to firejail.config in configuration files.
Docs: firejail.config: add warning about allow-tray.
Docs: mention that the protocol command accumulates.
Docs: mention inconsistent homedir involving --private=dir.
Docs: mention capabilities(7) on --caps.
New profiles: onionshare, onionshare-cli, opera-developer, songrec.
New profiles: node-gyp, npx, semver, ping-hardened.
Removed profiles: nvm.
0.9.68rc225 Jan 2022 03:16
minor feature:
Work in progress.
Exit code: distinguish fatal signals by adding 128.
File descriptors greater than 2 (--keep-fd).
Intrusion detection system (--ids-init, --ids-check).
Deterministic shutdown (--deterministic-exit-code.
--deterministic-shutdown).
Noprinters command.
Network monitor (--nettrace).
Network locker (--netlock).
Whitelist-ro profile command.
AppImage support in --build command.
Build: firecfg.config is now installed to /etc/firejail/.
Removed --disable-whitelist at compile time.
Removed whitelist=yes/no in /etc/firejail/firejail.config.
New condition: ALLOW_TRAY.
Remove (some) environment variables with auth-tokens.
New includes: whitelist-run-common.inc, disable-X11.inc.
Removed includes: disable-passwordmgr.inc.
New profiles: microsoft-edge-beta, clion-eap, lifeograph, zim.
New profiles: io.github.lainsce.Notejot, rednotebook, gallery-dl.
New profiles: yt-dlp, goldendict, goldendict, bundle, cmake.
New profiles: make, meson, pip, codium, telnet, ftp, OpenStego.
New profiles: imv, retroarch, torbrowser, CachyBrowser.
New profiles: notable, RPCS3, wget2, raincat, conitop, 1passwd.
New profiles: Seafile, neovim.
0.9.68rc119 Jan 2022 11:25
minor feature:
Work in progress.
Exit code: distinguish fatal signals by adding 128.
File descriptors greater than 2 (--keep-fd).
Intrusion detection system (--ids-init, --ids-check).
Deterministic shutdown (--deterministic-exit-code.
--deterministic-shutdown).
Noprinters command.
Network monitor (--nettrace).
Network locker (--netlock).
Whitelist-ro profile command.
Build: firecfg.config is now installed to /etc/firejail/.
Removed --disable-whitelist at compile time.
Removed whitelist=yes/no in /etc/firejail/firejail.config.
New condition: ALLOW_TRAY.
Remove (some) environment variables with auth-tokens.
New includes: whitelist-run-common.inc, disable-X11.inc.
Removed includes: disable-passwordmgr.inc.
New profiles: microsoft-edge-beta, clion-eap, lifeograph, zim.
New profiles: io.github.lainsce.Notejot, rednotebook, gallery-dl.
New profiles: yt-dlp, goldendict, goldendict, bundle, cmake.
New profiles: make, meson, pip, codium, telnet, ftp, OpenStego.
New profiles: imv, retroarch, torbrowser, CachyBrowser.
New profiles: notable, RPCS3, wget2, raincat.
0.9.6629 Jun 2021 03:16
minor feature:
Deprecated --audit options, relpaced by jailcheck utility.
Deprecated follow-symlink-as-user from firejail.config.
New firejail.config settings: private-bin, private-etc.
New firejail.config settings: private-opt, private-srv.
New firejail.config settings: whitelist-disable-topdir.
New firejail.config settings: seccomp-filter-add.
Removed kcmp syscall from seccomp default filter.
Rename --noautopulse to keep-config-pulse.
Filtering environment variables.
Zsh completion.
Command line: --mkdir, --mkfile.
--protocol now accumulates.
Jolla/SailfishOS patches.
Private-lib rework.
Whitelist rework.
Jailtest utility for testing running sandboxes.
Capabilities list update.
Faccessat2 syscall support.
--private-dev keeps /dev/input.
Added --noinput to disable /dev/input.
Add support for subdirs in --private-etc.
Compile time: --enable-force-nonewprivs.
Compile time: --disable-output.
Compile time: --enable-lts.
Subdirs support in private-etc.
Input devices support in private-dev, --no-input.
Support trailing comments on profile lines.
New profiles: vmware-view, display-im6.q16, ipcalc, ipcalc-ng.
Ebook-convert, ebook-edit, ebook-meta, ebook-polish, lzop.
Avidemux, calligragemini, vmware-player, vmware-workstation.
Gget, com.github.phase1geo.minder, nextcloud-desktop, pcsxr.
PPSSPPSDL, openmw, openmw-launcher, jami-gnome, PCSX2, sum.
Bcompare, b2sum, cksum, md5sum, sha1sum, sha224sum, sha256sum.
Sha384sum, sha512sum, librewold-nightly, Quodlibet, tmux, sway.
Alienarena, alienarena-wrapper, ballbuster, ballbuster-wrapper.
Colorful, colorful-wrapper, gl-117, gl-117-wrapper, glaxium.
Glaxium-wrapper, pinball, pinball-wrapper, etr-wrapper, firedragon.
Neverball-wrapper, neverputt-wrapper, supertuxkart-wrapper, neochat.
Cargo, LibreCAD, blobby, funnyboat, pipe-viewer, gtk-pipe-viewer.
Links2, xlinks2, googler, ddgr, tin.
0.9.64.227 Jan 2021 14:05
minor feature:
Allow --tmpfs inside HOME for unprivileged users.
--disable-usertmpfs compile time option.
Allow AF_BLUETOOTH via --protocol=bluetooth.
Setup guide for new users: contrib/firejail-welcome.sh.
Implement netns in profiles.
Added nolocal6.net IPv6 network filter.
New profiles: spectacle, chromium-browser-privacy, gtk-straw-viewer.
New profiles: gtk-youtube-viewer, gtk2-youtube-viewer, gtk3-youtube-viewer.
New profiles: straw-viewer, lutris, dolphin-emu, authenticator-rs, servo.
New profiles: npm, marker, yarn, lsar, unar, agetpkg, mdr, shotwell, qnapi.
New profiles: guvcview, pkglog, kdiff3, CoyIM.
0.9.6422 Oct 2020 03:45
minor feature:
Replaced --nowrap option with --wrap in firemon.
The blocking action of seccomp filters has been changed from.
Killing the process to returning EPERM to the caller. To get the
Previous behaviour, use --seccomp-error-action=kill or
Syscall:kill syntax when constructing filters, or override in
/etc/firejail/firejail.config file.
Fine-grained D-Bus sandboxing with xdg-dbus-proxy.
Xdg-dbus-proxy must be installed, if not D-Bus access will be allowed.
With this version nodbus is deprecated, in favor of dbus-user none and.
Dbus-system none and will be removed in a future version.
DHCP client support.
Firecfg only dektop-files if started with sudo.
SELinux labeling support.
Custom 32-bit seccomp filter support.
Restrict RUNUSER in several profiles.
Blacklist shells such as bash in several profiles.
Whitelist globbing.
Mkdir and mkfile support for /run/user directory.
Support ignore for include.
--include on the command line.
Splitting up media players whitelists in whitelist-players.inc.
New condition: HAS_NOSOUND.
New profiles: gfeeds, firefox-x11, tvbrowser, rtv, clipgrab, muraster.
New profiles: gnome-passwordsafe, bibtex, gummi, latex, mupdf-x11-curl.
New profiles: pdflatex, tex, wpp, wpspdf, wps, et, multimc, mupdf-x11.
New profiles: gnome-hexgl, com.github.johnfactotum.Foliate, mupdf-gl, mutool.
New profiles: desktopeditors, impressive, planmaker18, planmaker18free.
New profiles: presentations18, presentations18free, textmaker18, teams.
New profiles: textmaker18free, xournal, gnome-screenshot, ripperX.
New profiles: sound-juicer, com.github.dahenson.agenda, gnome-pomodoro.
New profiles: gnome-todo, x2goclient, iagno, kmplayer, penguin-command.
New profiles: frogatto, gnome-mines, gnome-nibbles, lightsoff, warmux.
New profiles: ts3client_runscript.sh, ferdi, abiword, four-in-a-row.
New profiles: gnome-mahjongg, gnome-robots, gnome-sudoku, gnome-taquin.
New profiles: gnome-tetravex, blobwars, gravity-beams-and-evaporating-stars.
New profiles
0.9.64rc106 Oct 2020 06:26
minor feature:
Replaced --nowrap option with --wrap in firemon.
The blocking action of seccomp filters has been changed from.
Killing the process to returning EPERM to the caller. To get the
Previous behaviour, use --seccomp-error-action=kill or
Syscall:kill syntax when constructing filters, or override in
/etc/firejail/firejail.config file.
Fine-grained D-Bus sandboxing with xdg-dbus-proxy.
Xdg-dbus-proxy must be installed, if not D-Bus access will be allowed.
With this version nodbus is deprecated, in favor of dbus-user none and.
Dbus-system none and will be removed in a future version.
DHCP client support.
Firecfg only dektop-files if started with sudo.
SELinux labeling support.
Custom 32-bit seccomp filter support.
Restrict RUNUSER in several profiles.
Blacklist shells such as bash in several profiles.
Whitelist globbing.
Mkdir and mkfile support for /run/user directory.
Support ignore for include.
--include on the command line.
Splitting up media players whitelists in whitelist-players.inc.
New condition: HAS_NOSOUND.
New profiles: gfeeds, firefox-x11, tvbrowser, rtv, clipgrab, muraster.
New profiles: gnome-passwordsafe, bibtex, gummi, latex, mupdf-x11-curl.
New profiles: pdflatex, tex, wpp, wpspdf, wps, et, multimc, mupdf-x11.
New profiles: gnome-hexgl, com.github.johnfactotum.Foliate, mupdf-gl, mutool.
New profiles: desktopeditors, impressive, planmaker18, planmaker18free.
New profiles: presentations18, presentations18free, textmaker18, teams.
New profiles: textmaker18free, xournal, gnome-screenshot, ripperX.
New profiles: sound-juicer, com.github.dahenson.agenda, gnome-pomodoro.
New profiles: gnome-todo, x2goclient, iagno, kmplayer, penguin-command.
New profiles: frogatto, gnome-mines, gnome-nibbles, lightsoff, warmux.
New profiles: ts3client_runscript.sh, ferdi, abiword, four-in-a-row.
New profiles: gnome-mahjongg, gnome-robots, gnome-sudoku, gnome-taquin.
New profiles: gnome-tetravex, blobwars, gravity-beams-and-evaporating-stars.
New profiles
0.9.6027 May 2019 03:15
minor feature:
Security reported by Austin Morton:
Seccomp filters are copied into /run/firejail/mnt, and are writable.
Within the jail. A malicious process can modify files from inside the
Jail. Processes that are later joined to the jail will not have seccomp
Filters applied.
Memory-deny-write-execute now also blocks memfd_create.
Add private-cwd option to control working directory within jail.
Blocking system D-Bus socket with --nodbus.
Bringing back Centos 6 support.
Drop support for flatpak/snap packages.
New profiles: crow, nyx, mypaint, celluoid, nano, transgui, mpdris2.
New profiles: sysprof, simplescreenrecorder, geekbench, xfce4-mixer.
New profiles: pavucontrol, d-feet, seahorse, secret-tool, gnome-keyring.
New profiles: regextester, hardinfo, gnome-system-log, gnome-nettool.
New profiles: netactview, redshift, devhelp, assogiate, subdownloader.
New profiles: font-manager, exfalso, gconf-editor, dconf-editor.
New profiles: sysprof-cli, seahorse-tool, secret-tool, dconf, gsettings.
New profiles: code-oss, pragha, Maelstrom, ostrichriders, bzflag.
New profiles: freeciv, lincity-ng, megaglest, openttd, crawl, crawl-tiles.
New profiles: teeworlds, torcs, tremulous, warsow, lugaru, manaplus.
New profiles: pioneer, scorched3d, widelands, freemind, kid3, kid3-qt.
New profiles: kid3-cli, nomacs, freecol, opencity, openclonk, slashem.
New profiles: vultureseye, vulturesclaw, anki, cheese, utox, mp3splt.
New profiles: oggsplt, flacsplt, gramps, newsboat, freeoffice-planmaker.
New profiles: autokey-gtk, autokey-qt, autokey-run, autokey-shell.
New profiles: freeoffice-presentations, freeoffice-textmaker, mp3wrap.
New profiles: inkview, meteo-qt, mp3splt-gtk, ktouch, yelp, cantata.
-- netblue30 Sun, 26 May 2019 08:00:00 -0500.
Firejail (0.9.58,2) baseline; urgency=low.
Cgroup flag in /etc/firejail/firejail.config file.
Name-change flag in /etc/firejail.config file.
--name rework.
New profiles: klavaro, vscodium.
Browser profiles various other -- net
0.9.5827 Jan 2019 03:15
minor feature:
--disable-mnt rework.
--net.print command.
GitLab CI/CD integration: disto specific builds.
Profile parser enhancements and conditional handling support.
For HAS_APPIMAGE, HAS_NODBUS, BROWSER_DISABLE_U2F
Profile name support.
Added explicit nonewprivs support to join option.
New profiles: QMediathekView, aria2c, Authenticator, checkbashisms.
New profiles: devilspie, devilspie2, easystroke, github-desktop, min.
New profiles: bsdcat, bsdcpio, bsdtar, lzmadec, lbunzip2, lbzcat.
New profiles: lbzip2, lzcat, lzcmp, lzdiff, lzegrep, lzfgrep, lzgrep.
New profiles: lzless, lzma, lzmainfo, lzmore, unlzma, unxz, xzcat.
New profiles: xzcmp, xzdiff, xzegrep, xzfgrep, xzgrep, xzless, xzmore.
New profiles: lzip, artha, nitroshare, nitroshare-cli, nitroshare-nmh.
New profiles: nirtoshare-send, nitroshare-ui, mencoder, gnome-pie.
New profiles: masterpdfeditor, QOwnNotes, aisleriot, Mendeley.
New profiles: feedreader, ocenaudio, mpsyt, thunderbird-wayland.
New profiles: supertuxkart, ghostwriter, gajim-history-manager.
0.9.56.112 Oct 2018 03:15
minor feature:
Work in progress.
--disable-mnt rework.
New profiles: QMediathekView, aria2c, Authenticator, checkbashisms.
New profiles: devilspie, devilspie2, easystroke, github-desktop, min.
New profiles: bsdcat, bsdcpio, bsdtar, lzmadec.
0.9.5619 Sep 2018 03:15
minor feature:
Modif: removed CFG_CHROOT_DESKTOP configuration option.
Modif: removed compile time --enable-network=restricted.
Modif: removed compile time --disable-bind.
Modif: --net=none allowed even if networking was disabled at compile.
Time or at run time
Modif: allow system users to run the sandbox.
Support wireless devices in --net option.
Support tap devices in --net option (tunneling support).
Allow IP address configuration if the parent interface specified
by --net is not configured (--netmask).
Support for firetunnel utility.
Disable U2F devices (--nou2f).
Add --private-cache to support private /.cache.
Support full paths in private-lib.
Globbing support in private-lib.
Support for local user directories in firecfg (--bindir).
New profiles: ms-excel, ms-office, ms-onenote, ms-outlook, ms-powerpoint.
New profiles: ms-skype, ms-word, riot-desktop, gnome-mpv, snox, gradio.
New profiles: standardnotes-desktop, shellcheck, patch, flameshot.
New profiles: rview, rvim, vimcat, vimdiff, vimpager, vimtutor, xxd.
New profiles: Beaker, electrum, clamtk, pybitmessage, dig, whois.
New profiles: jdownloader, Fluxbox, Blackbox, Awesome, i3.
New profiles: start-tor-browser.desktop.
0.9.5417 May 2018 03:15
minor feature:
Modif: --force removed.
Modif: --csh, --zsh removed.
Modif: --de-check-filename removed.
Modif: --git-install and --git-uninstall removed.
Modif: support for private-bin, private-lib and shell none has been.
Disabled while running AppImage archives in order to be able to use
Our regular profile files with AppImages.
Modif: restrictions for /proc, /sys and /run/user directories.
Are moved from AppArmor profile into firejail executable
Modif: unifying Chromium and Firefox browsers profiles.
All users of Firefox-based browsers who use addons and plugins.
That read/write from HOME will need to uncomment the includes for
Firefox-common-addons.inc in firefox-common.profile.
Modif: split disable-devel.inc into disable-devel and.
Disable-interpreters.inc
Firejail user access database (/etc/firejail/firejail.users.
Man firejail-users)
Add --noautopulse to disable automatic /.config/pulse (for complex setups).
Spectre mitigation patch for gcc and clang compiler.
D-Bus handling (--nodbus).
AppArmor support for overlayfs and chroot sandboxes.
AppArmor support for AppImages.
Enable AppArmor by default for a large number of programs.
Firejail --apparmor.print option.
Firemon --apparmor option.
Apparmor yes/no flag in /etc/firejail/firejail.config.
Seccomp syscall list update for glibc 2.26-10.
Seccomp disassembler for --seccomp.print option.
Seccomp machine code optimizer for default seccomp filters.
IPv6 DNS support.
Whitelist support for overlay and chroot sandboxes.
Private-dev support for overlay and chroot sandboxes.
Private-tmp support for overlay and chroot sandboxes.
Added sandbox name support in firemon.
Firemon/prctl enhancements.
Noblacklist support for /sys/module directory.
Whitelist support for /sys/module directory.
New profiles: basilisk, Tor Browser language packs, PlayOnLinux, sylpheed.
New profiles: discord-canary, pycharm-community, pycharm-professional.
New profiles: pdfchain, tilp, vivaldi-snapshot, bitcoin-qt, kaffein
0.9.5208 Dec 2017 10:25
minor feature:
Modif: --allow-private-blacklists was deprecated; blacklisting.
Read-only, read-write, tmpfs and noexec are allowed in
Private home directories
Modif: remount-proc-sys deprecated from firejail.config.
Modif: follow-symlink-private-bin deprecated from firejail.config.
Modif: --profile-path was deprecated.
Enhancement: support Firejail user config directory in firecfg.
Enhancement: disable DBus activation in firecfg.
Enhancement; enumerate root directories in apparmor profile.
Enhancement: /etc and /usr/share whitelisting support.
Enhancement: globbing support for --private-bin.
Feature: systemd-resolved integration.
Feature: whitelisting /var directory in most profiles.
Feature: GTK2, GTK3 and Qt4 private-lib support.
Feature: --de-private-lib.
Feature: test deployment of private-lib for the following.
Applications: evince, galculator, gnome-calculator,
Leafpad, mousepad, transmission-gtk, xcalc, xmr-stak-cpu,
Atril, mate-color-select, tar, file, strings, gpicview,
Eom, eog, gedit, pluma
Feature: --writable-run-user.
Feature: --rlimit-as.
Feature: --rlimit-cpu.
Feature: --timeout.
Feature: profile build tool (--build).
Feature: --netfilter.print.
Feature: --netfilter6.print.
Feature: netfilter template support.
New profiles: upstreamed many profiles from the following sources:
Https://github.com/chiraag-nataraj/firejail-profiles,
Https://github.com/nyancat18/fe,
Https://aur.archlinux.org/packages/firejail-profiles.
New profiles: terasology, surf, rocketchat, clamscan, clamdscan.
Clamdtop, freshclam, xmr-stak-cpu, amule, ardour4, ardour5,
Brackets, calligra, calligraauthor, calligraconverter, calligraflow,
Calligraplan, calligraplanwork, calligrasheets, calligrastage,
Calligrawords, cin, dooble, dooble-qt4, fetchmail, freecad, freecadcmd,
Google-earth,imagej, karbon, kdenlive, krita, linphone, lmms, macrofusion,
Mpd, natron, Natron, ricochet, shotcut, teamspeak3, tor, tor-browser-en,
Viber, x-terminal-emulator, zart, conky, arch-audit, ffmpeg,
0.9.5108 Sep 2017 03:15
minor feature:
Work in progress!.
-- netblue30 Mon, 12 Jun 2017 20:00:00 -0500.
Firejail (0.9.50 rc1) baseline; urgency=low.
Release pending!.
Modif: --output split in two commands, --output and --output-stderr.
Feature: per-profile disable-mnt (--disable-mnt).
Feature: per-profile support to set X11 Xephyr screen size (--xephyr-screen).
Feature: private /lib directory (--private-lib).
Feature: disable CDROM/DVD drive (--nodvd).
Feature: disable DVB devices (--notv).
Feature: --profile.print.
Enhancement: print all seccomp filters under --de enhancement: /proc/sys mounting.
Enhancement: rework IP address assingment for --net options.
Enhancement: support for newer Xpra versions (2.1+) -.
Set xpra-attach yes in /etc/firejail/firejail.config
Enhancement: all profiles use a standard layout style.
Enhancement: create /usr/local for firecfg if the directory doesn't exist.
Enhancement: allow full paths in --private-bin.
Seccomp feature: --memory-deny-write-execute.
Seccomp feature: seccomp post-exec.
Seccomp feature: block secondary architecture (--seccomp.block_secondary).
Seccomp feature: seccomp syscall groups.
Seccomp enhancement: print all seccomp filters under --de seccomp enhancement: default seccomp list update.
New profiles: curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite.
New profiles: Geary, Liferea, peek, silentarmy, IntelliJ IDEA.
New profiles: Android Studio, electron, riot-web, Extreme Tux Racer.
New profiles: Frozen Bubble, Open Invaders, Pingus, Simutrans, SuperTux.
New profiles: telegram-desktop, arm, rambox, apktool, baobab, dex2jar, gitg.
New profiles: hashcat, obs, picard, remmina, sdat2img, soundconverter.
New profiles: truecraft, gnome-twitch, tuxguitar, musescore, neverball.
New profiles: sqlitebrowse, Yandex Browser, minetest.
0.9.4813 Jun 2017 06:25
minor feature:
Modifs: whitelisted Transmission, Deluge, qBitTorrent, KTorrent;.
Please use /Downloads directory for saving files
Modifs: AppArmor made optional; a warning is printed on the screen
if the sandbox fails to load the AppArmor profile.
Feature: --novideo.
Feature: drop discretionary access control capabilities for.
Root sandboxes
Feature: added /etc/firejail/globals.local for global customizations.
Feature: profile support in overlayfs mode.
New profiles: vym, darktable, Waterfox, digiKam, Catfish, HandBrake.
0.9.4618 May 2017 03:15
minor feature:
Security: split most of networking code in a separate executable.
Security: split seccomp filter code configuration in a separate executable.
Security: split file copying in private option in a separate executable.
Feature: disable gnupg and systemd directories under /run/user.
Feature: test coverage (gcov) support.
Feature: allow root user access to /dev/shm (--noblacklist=/dev/shm).
Feature: private /opt directory (--private-opt, profile support).
Feature: private /srv directory (--private-srv, profile support).
Feature: spoof machine-id (--machine-id, profile support).
Feature: allow blacklists under --private (--allow-private-blacklist.
Profile support)
Feature: user-defined /etc/hosts file (--hosts-file, profile support).
Feature: support for the real /var/log directory (--writable-var-log.
Profile support)
Feature: config support for firejail prompt in terminals.
Feature: AppImage type 2 support.
Feature: pass command line arguments to appimages.
Feature: allow non-seccomp setup for OverlayFS sandboxes - more work to come.
Feature: added a number of Python scripts for handling sandboxes.
Feature: allow local customization using.local files under /etc/firejail.
Feature: follow-symlink-as-user runtime config option in.
/etc/firejail/firejail.config.
Feature: follow-symlink-private-bin option in /etc/firejail/firejail.config.
Feature: xvfb X11 server support (--x11=xvfb).
Feature: allow /tmp directory in mkdir and mkfile profile commands.
Feature: implemented --noblacklist command, profile support.
Feature: config support to disable access to /mnt and /media (disable-mnt).
Feature: config support to disable join (join).
Feature: disabled Go, Rust, and OpenSSL in disable-devel.conf.
Feature: support overlay, overlay-named and overlay-tmpfs in profile files.
Feature: allow PulseAudio sockets in --private-tmp.
Feature: ---sound support in firecfg.
Feature: added support for sandboxing Xpra, Xvfb and Xephyr in.
Independent sandboxes w
0.9.46-rc108 Apr 2017 03:15
minor feature:
Development version, work in progress.
Security: split most of networking code in a separate executable.
Security: split seccomp filter code configuration in a separate executable.
Security: split file copying in private option in a separate executable.
Feature: disable gnupg and systemd directories under /run/user.
Feature: test coverage (gcov) support.
Feature: allow root user access to /dev/shm (--noblacklist=/dev/shm).
Feature: private /opt directory (--private-opt, profile support).
Feature: private /srv directory (--private-srv, profile support).
Feature: spoof machine-id (--machine-id, profile support).
Feature: allow blacklists under --private (--allow-private-blacklist.
Profile support)
Feature: user-defined /etc/hosts file (--hosts-file, profile support).
Feature: support for the real /var/log directory (--writable-var-log.
Profile support)
Feature: config support for firejail prompt in terminals.
Feature: AppImage type 2 support.
Feature: pass command line arguments to appimages.
Feature: allow non-seccomp setup for OverlayFS sandboxes - more work to come.
Feature: added a number of Python scripts for handling sandboxes.
Feature: allow local customization using.local files under /etc/firejail.
Feature: follow-symlink-as-user runtime config option in.
/etc/firejail/firejail.config.
Feature: follow-symlink-private-bin option in /etc/firejail/firejail.config.
Feature: xvfb X11 server support (--x11=xvfb).
Feature: allow /tmp directory in mkdir and mkfile profile commands.
Feature: implemented --noblacklist command, profile support.
Feature: config support to disable access to /mnt and /media (disable-mnt).
Feature: config support to disable join (join).
Feature: disabled Go, Rust, and OpenSSL in disable-devel.conf.
New profiles: xiphos, Tor Browser Bundle, display (imagemagik), Wire.
New profiles: mumble, zoom, Guayadeque, qemu, keypass2, xed, pluma.
New profiles: Cryptocat, Bless, Gnome 2048, Gnome Calculator.
New profiles:
0.9.4422 Oct 2016 03:25
minor feature:
CVE-2016-7545 submitted by Aleksey Manevich.
Modifs: removed man firejail-config.
Modifs: --private-tmp whitelists /tmp/.X11-unix directory.
Modifs: Nvidia drivers added to --private-dev.
Modifs: /srv supported by --whitelist.
Feature: allow user access to /sys/fs (--noblacklist=/sys/fs).
Feature: support starting/joining sandbox is a single command.
(--join-or-start).
Feature: X11 detection support for --audit.
Feature: assign a name to the interface connected to the bridge.
(--veth-name).
Feature: all user home directories are visible (--allusers).
Feature: add files to sandbox container (--put).
Feature: blocking x11 (--x11=block).
Feature: X11 security extension (--x11=xorg).
Feature: disable 3D hardware acceleration (--no3d).
Feature: x11 xpra, x11 xephyr, x11 block, allusers, no3d profile commands.
Feature: move files in sandbox (--put).
Feature: accept wildcard patterns in user name field of restricted.
Shell login feature
New profiles: qpdfview, mupdf, Luminance HDR, Synfig Studio, Gimp, Inkscape.
New profiles: feh, ranger, zathura, 7z, keepass, keepassx.
New profiles: claws-mail, mutt, git, emacs, vim, xpdf, VirtualBox, OpenShot.
New profiles: Flowblade, Eye of GNOME (eog), Evolution.
0.9.4209 Sep 2016 03:15
minor security:
Security: --whitelist deleted files, submitted by Vasya Novikov.
Security: disable x32 ABI in seccomp, submitted by Jann Horn.
Security: tighten --chroot, submitted by Jann Horn.
Security: terminal sandbox escape, submitted by Stephan Sokolow.
Security: several TOCTOU submitted by Aleksey Manevich.
Modifs: bringing back --private-home option.
Modifs: deprecated --user option, please use "sudo -u username firejail".
Modifs: allow symlinks in home directory for --whitelist option.
Modifs: Firejail prompt is enabled by env variable FIREJAIL_PROMPT="yes".
Modifs: recursive mkdir.
Modifs: include /dev/snd in --private-dev.
Modifs: seccomp filter update.
Modifs: release archives moved to.xz format.
Feature: AppImage support (--appimage).
Feature: AppArmor support (--apparmor).
Feature: Ubuntu snap support (/etc/firejail/snap.profile).
Feature: Sandbox auditing support (--audit).
Feature: remove environment variable (--rmenv).
Feature: noexec support (--noexec).
Feature: clean local overlay storage directory (--overlay-clean).
Feature: store and reuse overlay (--overlay-named).
Feature: allow deging inside the sandbox with gdb and strace.
(--allow-degers).
Feature: mkfile profile command.
Feature: quiet profile command.
Feature: x11 profile command.
Feature: option to desktop files (firecfg --).
Compile time: Busybox support (--enable-busybox-workaround).
Compile time: disable overlayfs (--disable-overlayfs).
Compile time: disable whitlisting (--disable-whitelist).
Compile time: disable global config (--disable-globalcfg).
Run time: enable/disable overlayfs (overlayfs yes/no).
Run time: enable/disable quiet as default (quiet-by-default yes/no).
Run time: user-defined network filter (netfilter-default).
Run time: enable/disable whitelisting (whitelist yes/no).
Run time: enable/disable remounting of /proc and /sys.
(remount-proc-sys yes/no).
Run time: enable/disable chroot desktop features (chroot-desktop yes/no).
Profile
0.9.4025 May 2016 03:15
minor feature:
Added --nice option.
Added --x11 option.
Added --x11=xpra option.
Added --x11=xephyr option.
Added --cpu.print option.
Added filetransfer options --ls and --get.
Added --writable-etc and --writable-var options.
Added --read-only option.
Added mkdir, ipc-namespace, and nosound profile commands.
Added net, ip, defaultgw, ip6, mac, mtu and iprange profile commands.
--version also prints compile options.
--output option also redirects stderr.
Added compile-time option to restrict --net= to root only.
Run time config support, man firejail-config.
Added firecfg utility.
AppArmor default seccomp filter update.
Disable STUN/WebRTC in default netfilter configuration.
New profiles: lxterminal, Epiphany, cherrytree, Polari, Vivaldi, Atril.
New profiles: qutebrowser, SlimJet, Battle for Wesnoth, Hedgewars.
New profiles: qTox, OpenSSH client, OpenBox, Dillo, cmus, dnsmasq.
New profiles: PaleMoon, Icedove, abrowser, 0ad, netsurf, Warzone2100.
New profiles: okular, gwenview, Google-Play-Music-Desktop-Player.
New profiles: Aweather, Stellarium, gpredict, quiterss, cyberfox.
New profiles: generic Ubuntu snap application profile, xplayer.
New profiles: xreader, xviewer, mcabber.
Generic.profile renamed default.profile.
Build rpm packages using "make rpms".
0.9.40-rc105 May 2016 01:15
major feature:
Added a couple of options: --nice, --x11, --cpu.print, --ls, --get, --writable-etc, --writable-var.
New profile commands: mkdir, ipc-namespace, nosound, net, ip, defaultgw, ip6, mac, mtu and iprange
Added compile-time option to restrict --net= to root only, run time config support, man firejail-config.
Added firecfg utility, AppArmor fixes. The default seccomp filter was updated.
Disabled STUN/WebRTC in default netfilter configuration.
New profiles include:
lxterminal, Epiphany, cherrytree, Polari, Vivaldi, Atril,
qutebrowser, SlimJet, Battle for Wesnoth, Hedgewars,
qTox, OpenSSH client, OpenBox, Dillo, cmus, dnsmasq,
PaleMoon, Icedove, abrowser, 0ad, netsurf, Warzone2100,
okular, gwenview, Google-Play-Music-Desktop-Player,
Aweather, Stellarium, gpredict, quiterss, cyberfox,
and a generic Ubuntu snap application profile.
And some bugfixes.
0.9.2831 Jul 2015 14:05
bugfix:
network scanning, --scan option.
interface MAC address support, --mac option.
IP address range, --iprange option.
traffic shaping, --bandwidth option.
reworked printing of network status at startup.
man pages rework.
added firejail-login man page.
added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
profiles.
added an /etc/firejail/disable-common.inc file to hold common directory
blacklists.
blacklist Opera and Chrome/Chromium config directories in profile files.
support noroot option for profile files.
enabled noroot in default profile files.
bugfixes.
-- netblue30 Sat, 1 Aug 2015 08:00:00 -0500.
0.9.2710 May 2015 20:45
bugfix:
work in progress.
* network scanning.
* interface MAC address support.
* reworked network status printed when the sandbox starts.
* bugfixes.
-- netblue30 Sun, 9 May 2015 08:00:00 -0500.
0.9.2630 Apr 2015 10:45
bugfix:
Private dev directory.
Private.keep option for whitelisting home files in a new private directory.
User namespaces support, noroot option.
Added Deluge and qBittorent profiles.
Bugfixes.
0.9.2406 Apr 2015 16:45
bugfix:
Whitelist and blacklist seccomp filters.
Doubledash option.
--shell=none support.
Netfilter file support in profile files.
DNS server support in profile files.
Added --dns.print option.
Added default profiles for Audacious, Clementine, Gnome-MPlayer, Rhythmbox and Totem.
Added --caps.drop=all in default profiles.
New syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp,
clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init.
Bugfix: using /proc/sys/kernel/pid_max for the max number of pids.
Two build patches from Reiner Herman.
Man page patch from Reiner Herman.
0.9.2324 Mar 2015 22:25
minor bugfix:
Ongoing development.
Two build patches and a new man page.
Netfilter file support in profile.
--caps.drop=all in default profiles.
Doubledash option.
--shell=none support in profile files.
DNS server support in profile files.
Added --dns.print option.
Whitelist seccomp filters.
New syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp.
clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init.
Bugfix: using /proc/sys/kernel/pid_max for the max number of pids.
0.9.2210 Mar 2015 10:05
bugfix:
Replaced --noip option with --ip=none.
Container stdout logging and log rotation.
Added process_vm_readv, process_vm_writev and mknod to.
default seccomp blacklist.
Added CAP_MKNOD to default caps blacklist.
Blacklist and whitelist custom Linux capabilities filters.
macvlan device driver support for --net option.
DNS server support, --dns option.
Netfilter support.
Monitor network statistics, --netstats option.
Added profile for Mozilla Thunderbird/Icedove.
overlay support for Linux kernels 3.18+.
Bugfix: preserve .Xauthority file in private mode .
Bugfix: check uid/gid for cgroup.
0.9.2116 Feb 2015 07:05
bugfix:
this is a rolling development version
todo: help and man support for all
Container stdout logging and log rotation
Added process_vm_readv and process_vm_writev to default seccomp blacklist
Custom Linux capabilities whitefilter support
bugfix: check uid/gid for cgroup
replaced --noip option with --ip=none
macvlan device driver support for --net option
preserve .Xauthority file in private mode
todo: preserve .Xauthority file in chroot mode
DNS server support, --dns option
netblue30 Sun, 15 Feb 2015 08:00:00 -0500
0.9.2003 Feb 2015 06:25
bugfix:
utmp, btmp and wtmp enhancements
create empty /var/log/wtmp and /var/log/btmp files in sandbox
generate a new /var/run/utmp file in sandbox
CPU affinity, --cpu option
Linux control groups support, --cgroup option
Opera web browser support
VLC support
Added "empty" attribute to seccomp command to remove the default
syscall list form seccomp blacklist
Added --nogroups option to disable supplementary groups for regular
users. root user always runs without supplementary groups.
firemon enhancements
display the command that started the sandbox
added --caps option to display capabilities for all sandboxes
added --cgroup option to display the control groups for all sandboxes
added --cpu option to display CPU affinity for all sandboxes
added --seccomp option to display seccomp setting for all sandboxes
New compile time options: --disable-chroot, --disable-bind
bugfixes
netblue30 Mon, 02 Feb 2015 08:00:00 -0500
0.9.1826 Dec 2014 08:05
bugfix:
Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
Support for tracing setreuid, setregid, setresuid, setresguid syscalls
Added profiles for transmission-gtk and transmission-qt
bugfixes
netblue30 Fri, 25 Dec 2014 10:00:00 -0500
0.9.1611 Nov 2014 03:15
bugfix:
Configurable private home directory
Configurable default user shell
Software configuration support for --docdir and DESTDIR
Profile file support for include, caps, seccomp and private keywords
Dropbox profile file
Linux capabilities and seccomp filters enabled by default for Firefox,
Midori, Evince and Dropbox
bugfixes
netblue30 Tue, 4 Nov 2014 10:00:00 -0500
0.9.1427 Oct 2014 11:56
major feature:
This release brings in support for user-defined seccomp blacklists, tracing filesystem and network accesses, bind mounts, process resource limits, monitoring ARP tables, route tables and interfaces, and a number of smaller features and bugfixes.
0.9.12.201 Oct 2014 19:17
minor bugfix:
More pulseaudio fixes.
The overlay option was temporarily disabled in this build.