Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities.
Description
Event Timeline
Questionable whether we really need this in Solus or not. You shouldn't be running untrusted applications on Solus in the first place and we wouldn't be providing via the repo "untrusted applications".
I was thinking more of being able to run e.g. the browser in Firejail (not as a default of course) to limit the impact of browser exploits etc.
Browser exploits from what exactly? Chrome does per-process isolation and sandboxing and any "exploits" would be CVEs, which already get addressed.
It would act more as a protection against zero-day vulnerabilities, and would have e.g. helped against this Firefox bug due to only letting Firefox access a few select folders.
Here is another example:
https://l3net.wordpress.com/2016/01/20/firejail-target-practice-cve-2016-0728/
But yeah, I guess the general interest in this package would be pretty low so those interested can just compile it themselves.
We released that Firefox update within moments of the Firefox release going public on Mozila's infra:
https://git.solus-project.com/packages/firefox/tag/?h=firefox-39.0.3-23