diff --git a/files/0001-Support-a-stateless-configuration.patch b/files/0001-Support-a-stateless-configuration.patch --- a/files/0001-Support-a-stateless-configuration.patch +++ b/files/0001-Support-a-stateless-configuration.patch @@ -1,23 +1,23 @@ -From 24b252d3761ce21131e4dbe91da9606bb0cb628c Mon Sep 17 00:00:00 2001 -From: Ikey Doherty -Date: Sun, 27 Nov 2016 19:05:55 +0000 +From d9411937dcd19632b002fc74eb1b18619737827f Mon Sep 17 00:00:00 2001 +From: Pierre-Yves +Date: Sun, 20 Aug 2017 15:38:03 +0200 Subject: [PATCH] Support a stateless configuration -Signed-off-by: Ikey Doherty +Signed-off-by: Pierre-Yves --- Makefile.in | 9 +++++---- configure.ac | 1 + src/firejail/Makefile.in | 3 ++- - src/firejail/checkcfg.c | 10 ++++++---- + src/firejail/checkcfg.c | 7 ++++++- src/firejail/main.c | 11 +++++++++++ src/firejail/restricted_shell.c | 12 ++++++++++-- - 6 files changed, 35 insertions(+), 11 deletions(-) + 6 files changed, 35 insertions(+), 8 deletions(-) diff --git a/Makefile.in b/Makefile.in -index dbf53e2..d608c36 100644 +index 0b24552..4ea6e74 100644 --- a/Makefile.in +++ b/Makefile.in -@@ -8,6 +8,7 @@ exec_prefix=@exec_prefix@ +@@ -9,6 +9,7 @@ exec_prefix=@exec_prefix@ bindir=@bindir@ libdir=@libdir@ datarootdir=@datarootdir@ @@ -25,7 +25,7 @@ mandir=@mandir@ sysconfdir=@sysconfdir@ -@@ -82,12 +83,12 @@ realinstall: +@@ -115,12 +116,12 @@ endif install -c -m 0644 README $(DESTDIR)/$(DOCDIR)/. install -c -m 0644 RELNOTES $(DESTDIR)/$(DOCDIR)/. # etc files @@ -40,13 +40,13 @@ - sh -c "if [ ! -f $(DESTDIR)/$(sysconfdir)/firejail/login.users ]; then install -c -m 0644 etc/login.users $(DESTDIR)/$(sysconfdir)/firejail/.; fi;" + sh -c "if [ ! -f $(DESTDIR)/$(datadir)/defaults/firejail/login.users ]; then install -c -m 0644 etc/login.users $(DESTDIR)/$(datadir)/defaults/firejail/.; fi;" rm -fr .etc - ifeq ($(HAVE_APPARMOR),-DHAVE_APPARMOR) + ifeq ($(HAVE_APPARMOR),-DHAVE_APPARMOR) # install apparmor profile diff --git a/configure.ac b/configure.ac -index da4b315..f776f99 100644 +index c0f5dd3..751f423 100644 --- a/configure.ac +++ b/configure.ac -@@ -154,6 +154,7 @@ echo +@@ -183,6 +183,7 @@ echo echo "Configuration options:" echo " prefix: $prefix" echo " sysconfdir: $sysconfdir" @@ -55,7 +55,7 @@ echo " : $HAVE_SECCOMP_H" echo " apparmor: $HAVE_APPARMOR" diff --git a/src/firejail/Makefile.in b/src/firejail/Makefile.in -index fce4609..819464b 100644 +index 2059713..48f1ddd 100644 --- a/src/firejail/Makefile.in +++ b/src/firejail/Makefile.in @@ -4,6 +4,7 @@ prefix=@prefix@ @@ -66,58 +66,48 @@ VERSION=@PACKAGE_VERSION@ NAME=@PACKAGE_NAME@ -@@ -27,7 +28,7 @@ H_FILE_LIST = $(sort $(wildcard *.[h])) +@@ -29,7 +30,7 @@ H_FILE_LIST = $(sort $(wildcard *.[h])) C_FILE_LIST = $(sort $(wildcard *.c)) OBJS = $(C_FILE_LIST:.c=.o) BINOBJS = $(foreach file, $(OBJS), $file) --CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DLIBDIR='"$(libdir)"' $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_OVERLAYFS) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security -+CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DDATADIR='"$(datadir)"' -DLIBDIR='"$(libdir)"' $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_OVERLAYFS) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security +-CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' $(HAVE_GCOV) $(HAVE_GIT_INSTALL) -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DLIBDIR='"$(libdir)"' $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_OVERLAYFS) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security ++CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' $(HAVE_GCOV) $(HAVE_GIT_INSTALL) -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DDATADIR='"$(datadir)"' -DLIBDIR='"$(libdir)"' $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_OVERLAYFS) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security LDFLAGS += -pie -Wl,-z,relro -Wl,-z,now -lpthread - %.o : %.c $(H_FILE_LIST) ../include/common.h ../include/euid_common.h ../include/libnetlink.h ../include/pid.h + %.o : %.c $(H_FILE_LIST) ../include/common.h ../include/euid_common.h ../include/pid.h ../include/seccomp.h ../include/syscall.h diff --git a/src/firejail/checkcfg.c b/src/firejail/checkcfg.c -index 78c0e5c..d82e01c 100644 +index f4e28f0..85e1a5b 100644 --- a/src/firejail/checkcfg.c +++ b/src/firejail/checkcfg.c -@@ -43,9 +43,12 @@ int checkcfg(int val) { - cfg_val[CFG_PRIVATE_BIN_NO_LOCAL] = 0; // disabled by default - +@@ -51,7 +51,12 @@ int checkcfg(int val) { + cfg_val[CFG_DISABLE_MNT] = 0; + // open configuration file -- char *fname; -- if (asprintf(&fname, "%s/firejail.config", SYSCONFDIR) == -1) -- errExit("asprintf"); +- const char *fname = SYSCONFDIR "/firejail.config"; + const char *fname; + if (access(SYSCONFDIR "/firejail.config", F_OK) == 0) { + fname = SYSCONFDIR "/firejail.config"; + } else { + fname = DATADIR "/defaults/firejail/firejail.config"; + } - - FILE *fp = fopen(fname, "r"); + fp = fopen(fname, "r"); if (!fp) { -@@ -274,7 +277,6 @@ int checkcfg(int val) { - } - - fclose(fp); -- free(fname); - initialized = 1; - } - + #ifdef HAVE_GLOBALCFG diff --git a/src/firejail/main.c b/src/firejail/main.c -index b5a97c7..6529f97 100644 +index cff61f6..fc44ad2 100644 --- a/src/firejail/main.c +++ b/src/firejail/main.c -@@ -45,6 +45,9 @@ printf("time %s:%d %u\n", __FILE__, __LINE__, (uint32_t) systick); - } - #endif +@@ -40,6 +40,9 @@ + uid_t firejail_uid = 0; + gid_t firejail_gid = 0; +// Stateless configuration directory +#define DEFAULTSDIR DATADIR "/defaults/firejail" + - uid_t firejail_uid = 0; - gid_t firejail_gid = 0; - -@@ -2361,6 +2364,10 @@ int main(int argc, char **argv) { + #define STACK_SIZE (1024 * 1024) + static char child_stack[STACK_SIZE]; // space for child's stack + Config cfg; // configuration +@@ -2265,6 +2268,10 @@ int main(int argc, char **argv) { rv = profile_find(cfg.command_name, SYSCONFDIR); custom_profile = rv; } @@ -128,7 +118,7 @@ } // use default.profile as the default -@@ -2395,6 +2402,10 @@ int main(int argc, char **argv) { +@@ -2297,6 +2304,10 @@ int main(int argc, char **argv) { else custom_profile = profile_find(profile_name, SYSCONFDIR); } @@ -140,7 +130,7 @@ fprintf(stderr, "Error: no default.profile installed\n"); exit(1); diff --git a/src/firejail/restricted_shell.c b/src/firejail/restricted_shell.c -index 979bb1e..2817f93 100644 +index d09a2c7..4162d14 100644 --- a/src/firejail/restricted_shell.c +++ b/src/firejail/restricted_shell.c @@ -34,8 +34,16 @@ int restricted_shell(const char *user) { @@ -163,5 +153,5 @@ int lineno = 0; char buf[MAX_READ]; -- -2.10.2 +2.14.1 diff --git a/package.yml b/package.yml --- a/package.yml +++ b/package.yml @@ -1,13 +1,13 @@ name : firejail -version : 0.9.44.10 -release : 4 +version : 0.9.50 +release : 5 source : - - https://github.com/netblue30/firejail/archive/0.9.44.10.tar.gz : eccb6f8ace71142253a1ed0e6902bbb3dd560d34bb4785ff1e7d01f0263ade34 + - https://github.com/netblue30/firejail/archive/0.9.50.tar.gz : 2a43f6eed74a09d62f6034961bb82da27993344e2937b6ad2fa14782d13ed0ee license : GPL-2.0 component : security summary : Firejail is a SUID sandbox program description: | - Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications + Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. setup : | %patch -p1 < $pkgfiles/0001-Support-a-stateless-configuration.patch %reconfigure diff --git a/pspec_x86_64.xml b/pspec_x86_64.xml --- a/pspec_x86_64.xml +++ b/pspec_x86_64.xml @@ -3,212 +3,418 @@ firejail Pierre-Yves - pyu@skynet.be + pyu@riseup.net GPL-2.0 security Firejail is a SUID sandbox program - Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications + Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. https://solus-project.com/sources/README.Solus firejail Firejail is a SUID sandbox program - Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications + Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. security /usr/bin /usr/lib64/firejail/faudit + /usr/lib64/firejail/fcopy /usr/lib64/firejail/firecfg.config + /usr/lib64/firejail/fix_private-bin.py + /usr/lib64/firejail/fj-mkdeb.py + /usr/lib64/firejail/fjclip.py + /usr/lib64/firejail/fjdisplay.py + /usr/lib64/firejail/fjresize.py + /usr/lib64/firejail/fldd + /usr/lib64/firejail/fnet + /usr/lib64/firejail/fseccomp /usr/lib64/firejail/fshaper.sh /usr/lib64/firejail/ftee - /usr/lib64/firejail/libconnect.so + /usr/lib64/firejail/libpostexecseccomp.so /usr/lib64/firejail/libtrace.so /usr/lib64/firejail/libtracelog.so + /usr/lib64/firejail/seccomp + /usr/lib64/firejail/seccomp.32 + /usr/lib64/firejail/seccomp.64 + /usr/lib64/firejail/seccomp.block_secondary + /usr/lib64/firejail/seccomp.debug + /usr/lib64/firejail/seccomp.mdwx /usr/share/bash-completion/completions/firecfg /usr/share/bash-completion/completions/firejail /usr/share/bash-completion/completions/firemon /usr/share/defaults/firejail/0ad.profile + /usr/share/defaults/firejail/2048-qt.profile /usr/share/defaults/firejail/7z.profile + /usr/share/defaults/firejail/Cryptocat.profile /usr/share/defaults/firejail/Cyberfox.profile + /usr/share/defaults/firejail/FossaMail.profile + /usr/share/defaults/firejail/Gitter.profile /usr/share/defaults/firejail/Mathematica.profile /usr/share/defaults/firejail/Telegram.profile + /usr/share/defaults/firejail/Thunar.profile + /usr/share/defaults/firejail/VirtualBox.profile + /usr/share/defaults/firejail/Wire.profile + /usr/share/defaults/firejail/Xephyr.profile + /usr/share/defaults/firejail/Xvfb.profile /usr/share/defaults/firejail/abrowser.profile + /usr/share/defaults/firejail/akregator.profile + /usr/share/defaults/firejail/amarok.profile + /usr/share/defaults/firejail/android-studio.profile + /usr/share/defaults/firejail/apktool.profile + /usr/share/defaults/firejail/arduino.profile + /usr/share/defaults/firejail/ark.profile + /usr/share/defaults/firejail/arm.profile /usr/share/defaults/firejail/atom-beta.profile /usr/share/defaults/firejail/atom.profile + /usr/share/defaults/firejail/atool.profile /usr/share/defaults/firejail/atril.profile /usr/share/defaults/firejail/audacious.profile /usr/share/defaults/firejail/audacity.profile /usr/share/defaults/firejail/aweather.profile + /usr/share/defaults/firejail/baloo_file.profile + /usr/share/defaults/firejail/baobab.profile + /usr/share/defaults/firejail/bibletime.profile /usr/share/defaults/firejail/bitlbee.profile + /usr/share/defaults/firejail/bleachbit.profile + /usr/share/defaults/firejail/blender.profile + /usr/share/defaults/firejail/bless.profile + /usr/share/defaults/firejail/brasero.profile /usr/share/defaults/firejail/brave.profile + /usr/share/defaults/firejail/caja.profile + /usr/share/defaults/firejail/calibre.profile + /usr/share/defaults/firejail/catfish.profile /usr/share/defaults/firejail/cherrytree.profile /usr/share/defaults/firejail/chromium-browser.profile /usr/share/defaults/firejail/chromium.profile /usr/share/defaults/firejail/claws-mail.profile /usr/share/defaults/firejail/clementine.profile + /usr/share/defaults/firejail/clipit.profile /usr/share/defaults/firejail/cmus.profile /usr/share/defaults/firejail/conkeror.profile /usr/share/defaults/firejail/corebird.profile /usr/share/defaults/firejail/cpio.profile + /usr/share/defaults/firejail/cryptocat.profile + /usr/share/defaults/firejail/curl.profile + /usr/share/defaults/firejail/cvlc.profile /usr/share/defaults/firejail/cyberfox.profile + /usr/share/defaults/firejail/darktable.profile /usr/share/defaults/firejail/deadbeef.profile /usr/share/defaults/firejail/default.profile /usr/share/defaults/firejail/deluge.profile + /usr/share/defaults/firejail/dex2jar.profile + /usr/share/defaults/firejail/dia.profile + /usr/share/defaults/firejail/digikam.profile /usr/share/defaults/firejail/dillo.profile + /usr/share/defaults/firejail/dino.profile /usr/share/defaults/firejail/disable-common.inc /usr/share/defaults/firejail/disable-devel.inc /usr/share/defaults/firejail/disable-passwdmgr.inc /usr/share/defaults/firejail/disable-programs.inc + /usr/share/defaults/firejail/display.profile /usr/share/defaults/firejail/dnscrypt-proxy.profile /usr/share/defaults/firejail/dnsmasq.profile + /usr/share/defaults/firejail/dolphin.profile /usr/share/defaults/firejail/dosbox.profile + /usr/share/defaults/firejail/dragon.profile /usr/share/defaults/firejail/dropbox.profile + /usr/share/defaults/firejail/ebook-viewer.profile + /usr/share/defaults/firejail/electron.profile + /usr/share/defaults/firejail/elinks.profile /usr/share/defaults/firejail/emacs.profile /usr/share/defaults/firejail/empathy.profile + /usr/share/defaults/firejail/enchant.profile + /usr/share/defaults/firejail/engrampa.profile /usr/share/defaults/firejail/eog.profile /usr/share/defaults/firejail/eom.profile /usr/share/defaults/firejail/epiphany.profile + /usr/share/defaults/firejail/etr.profile /usr/share/defaults/firejail/evince.profile /usr/share/defaults/firejail/evolution.profile + /usr/share/defaults/firejail/exiftool.profile /usr/share/defaults/firejail/fbreader.profile /usr/share/defaults/firejail/feh.profile + /usr/share/defaults/firejail/file-roller.profile /usr/share/defaults/firejail/file.profile /usr/share/defaults/firejail/filezilla.profile /usr/share/defaults/firejail/firefox-esr.profile + /usr/share/defaults/firejail/firefox-nightly.profile /usr/share/defaults/firejail/firefox.profile /usr/share/defaults/firejail/firejail.config /usr/share/defaults/firejail/flashpeak-slimjet.profile /usr/share/defaults/firejail/flowblade.profile + /usr/share/defaults/firejail/fontforge.profile + /usr/share/defaults/firejail/fossamail.profile /usr/share/defaults/firejail/franz.profile + /usr/share/defaults/firejail/frozen-bubble.profile /usr/share/defaults/firejail/gajim.profile + /usr/share/defaults/firejail/galculator.profile + /usr/share/defaults/firejail/geany.profile + /usr/share/defaults/firejail/geary.profile + /usr/share/defaults/firejail/gedit.profile + /usr/share/defaults/firejail/geeqie.profile + /usr/share/defaults/firejail/ghb.profile + /usr/share/defaults/firejail/gimp-2.8.profile /usr/share/defaults/firejail/gimp.profile /usr/share/defaults/firejail/git.profile + /usr/share/defaults/firejail/gitg.profile /usr/share/defaults/firejail/gitter.profile + /usr/share/defaults/firejail/gjs.profile + /usr/share/defaults/firejail/globaltime.profile + /usr/share/defaults/firejail/gnome-2048.profile + /usr/share/defaults/firejail/gnome-books.profile + /usr/share/defaults/firejail/gnome-calculator.profile /usr/share/defaults/firejail/gnome-chess.profile + /usr/share/defaults/firejail/gnome-clocks.profile + /usr/share/defaults/firejail/gnome-contacts.profile + /usr/share/defaults/firejail/gnome-documents.profile + /usr/share/defaults/firejail/gnome-font-viewer.profile + /usr/share/defaults/firejail/gnome-maps.profile /usr/share/defaults/firejail/gnome-mplayer.profile + /usr/share/defaults/firejail/gnome-music.profile + /usr/share/defaults/firejail/gnome-photos.profile + /usr/share/defaults/firejail/gnome-twitch.profile + /usr/share/defaults/firejail/gnome-weather.profile + /usr/share/defaults/firejail/goobox.profile /usr/share/defaults/firejail/google-chrome-beta.profile /usr/share/defaults/firejail/google-chrome-stable.profile /usr/share/defaults/firejail/google-chrome-unstable.profile /usr/share/defaults/firejail/google-chrome.profile /usr/share/defaults/firejail/google-play-music-desktop-player.profile + /usr/share/defaults/firejail/gpa.profile + /usr/share/defaults/firejail/gpg-agent.profile + /usr/share/defaults/firejail/gpg.profile + /usr/share/defaults/firejail/gpicview.profile /usr/share/defaults/firejail/gpredict.profile /usr/share/defaults/firejail/gtar.profile /usr/share/defaults/firejail/gthumb.profile + /usr/share/defaults/firejail/guayadeque.profile + /usr/share/defaults/firejail/gucharmap.profile /usr/share/defaults/firejail/gwenview.profile /usr/share/defaults/firejail/gzip.profile + /usr/share/defaults/firejail/handbrake-gtk.profile + /usr/share/defaults/firejail/handbrake.profile + /usr/share/defaults/firejail/hashcat.profile /usr/share/defaults/firejail/hedgewars.profile /usr/share/defaults/firejail/hexchat.profile + /usr/share/defaults/firejail/highlight.profile + /usr/share/defaults/firejail/hugin.profile /usr/share/defaults/firejail/icecat.profile /usr/share/defaults/firejail/icedove.profile /usr/share/defaults/firejail/iceweasel.profile + /usr/share/defaults/firejail/idea.sh.profile + /usr/share/defaults/firejail/img2txt.profile /usr/share/defaults/firejail/inkscape.profile /usr/share/defaults/firejail/inox.profile + /usr/share/defaults/firejail/iridium-browser.profile + /usr/share/defaults/firejail/iridium.profile + /usr/share/defaults/firejail/itch.profile + /usr/share/defaults/firejail/jd-gui.profile /usr/share/defaults/firejail/jitsi.profile + /usr/share/defaults/firejail/k3b.profile + /usr/share/defaults/firejail/kate.profile + /usr/share/defaults/firejail/kcalc.profile /usr/share/defaults/firejail/keepass.profile + /usr/share/defaults/firejail/keepass2.profile /usr/share/defaults/firejail/keepassx.profile + /usr/share/defaults/firejail/keepassx2.profile + /usr/share/defaults/firejail/keepassxc.profile + /usr/share/defaults/firejail/kino.profile /usr/share/defaults/firejail/kmail.profile + /usr/share/defaults/firejail/knotes.profile + /usr/share/defaults/firejail/kodi.profile /usr/share/defaults/firejail/konversation.profile + /usr/share/defaults/firejail/ktorrent.profile + /usr/share/defaults/firejail/kwrite.profile + /usr/share/defaults/firejail/leafpad.profile /usr/share/defaults/firejail/less.profile /usr/share/defaults/firejail/libreoffice.profile + /usr/share/defaults/firejail/liferea.profile /usr/share/defaults/firejail/localc.profile /usr/share/defaults/firejail/lodraw.profile /usr/share/defaults/firejail/loffice.profile /usr/share/defaults/firejail/lofromtemplate.profile /usr/share/defaults/firejail/login.users /usr/share/defaults/firejail/loimpress.profile + /usr/share/defaults/firejail/lollypop.profile /usr/share/defaults/firejail/lomath.profile /usr/share/defaults/firejail/loweb.profile /usr/share/defaults/firejail/lowriter.profile /usr/share/defaults/firejail/luminance-hdr.profile + /usr/share/defaults/firejail/lximage-qt.profile + /usr/share/defaults/firejail/lxmusic.profile /usr/share/defaults/firejail/lxterminal.profile + /usr/share/defaults/firejail/lynx.profile + /usr/share/defaults/firejail/mate-calc.profile + /usr/share/defaults/firejail/mate-calculator.profile + /usr/share/defaults/firejail/mate-color-select.profile + /usr/share/defaults/firejail/mate-dictionary.profile /usr/share/defaults/firejail/mathematica.profile /usr/share/defaults/firejail/mcabber.profile + /usr/share/defaults/firejail/mediainfo.profile + /usr/share/defaults/firejail/mediathekview.profile + /usr/share/defaults/firejail/meld.profile /usr/share/defaults/firejail/midori.profile + /usr/share/defaults/firejail/minetest.profile + /usr/share/defaults/firejail/mousepad.profile + /usr/share/defaults/firejail/mplayer.profile /usr/share/defaults/firejail/mpv.profile + /usr/share/defaults/firejail/multimc5.profile + /usr/share/defaults/firejail/mumble.profile /usr/share/defaults/firejail/mupdf.profile /usr/share/defaults/firejail/mupen64plus.profile + /usr/share/defaults/firejail/musescore.profile /usr/share/defaults/firejail/mutt.profile + /usr/share/defaults/firejail/nautilus.profile + /usr/share/defaults/firejail/nemo.profile /usr/share/defaults/firejail/netsurf.profile + /usr/share/defaults/firejail/neverball.profile /usr/share/defaults/firejail/nolocal.net + /usr/share/defaults/firejail/nylas.profile + /usr/share/defaults/firejail/obs.profile + /usr/share/defaults/firejail/odt2txt.profile /usr/share/defaults/firejail/okular.profile + /usr/share/defaults/firejail/open-invaders.profile /usr/share/defaults/firejail/openbox.profile /usr/share/defaults/firejail/openshot.profile /usr/share/defaults/firejail/opera-beta.profile /usr/share/defaults/firejail/opera.profile + /usr/share/defaults/firejail/orage.profile /usr/share/defaults/firejail/palemoon.profile /usr/share/defaults/firejail/parole.profile + /usr/share/defaults/firejail/pcmanfm.profile + /usr/share/defaults/firejail/pdfsam.profile + /usr/share/defaults/firejail/pdftotext.profile + /usr/share/defaults/firejail/peek.profile + /usr/share/defaults/firejail/picard.profile /usr/share/defaults/firejail/pidgin.profile + /usr/share/defaults/firejail/pingus.profile + /usr/share/defaults/firejail/pithos.profile /usr/share/defaults/firejail/pix.profile + /usr/share/defaults/firejail/pluma.profile /usr/share/defaults/firejail/polari.profile /usr/share/defaults/firejail/psi-plus.profile /usr/share/defaults/firejail/qbittorrent.profile + /usr/share/defaults/firejail/qemu-launcher.profile + /usr/share/defaults/firejail/qemu-system-x86_64.profile + /usr/share/defaults/firejail/qlipper.profile /usr/share/defaults/firejail/qpdfview.profile /usr/share/defaults/firejail/qtox.profile /usr/share/defaults/firejail/quassel.profile /usr/share/defaults/firejail/quiterss.profile + /usr/share/defaults/firejail/qupzilla.profile /usr/share/defaults/firejail/qutebrowser.profile + /usr/share/defaults/firejail/rambox.profile /usr/share/defaults/firejail/ranger.profile + /usr/share/defaults/firejail/remmina.profile /usr/share/defaults/firejail/rhythmbox.profile + /usr/share/defaults/firejail/riot-web.profile + /usr/share/defaults/firejail/ristretto.profile /usr/share/defaults/firejail/rtorrent.profile + /usr/share/defaults/firejail/scribus.profile + /usr/share/defaults/firejail/sdat2img.profile /usr/share/defaults/firejail/seamonkey-bin.profile /usr/share/defaults/firejail/seamonkey.profile /usr/share/defaults/firejail/server.profile + /usr/share/defaults/firejail/silentarmy.profile + /usr/share/defaults/firejail/simple-scan.profile + /usr/share/defaults/firejail/simutrans.profile + /usr/share/defaults/firejail/skanlite.profile /usr/share/defaults/firejail/skype.profile /usr/share/defaults/firejail/skypeforlinux.profile /usr/share/defaults/firejail/slack.profile + /usr/share/defaults/firejail/smplayer.profile /usr/share/defaults/firejail/snap.profile /usr/share/defaults/firejail/soffice.profile + /usr/share/defaults/firejail/soundconverter.profile /usr/share/defaults/firejail/spotify.profile + /usr/share/defaults/firejail/sqlitebrowser.profile + /usr/share/defaults/firejail/ssh-agent.profile /usr/share/defaults/firejail/ssh.profile + /usr/share/defaults/firejail/start-tor-browser.profile /usr/share/defaults/firejail/steam.profile /usr/share/defaults/firejail/stellarium.profile /usr/share/defaults/firejail/strings.profile + /usr/share/defaults/firejail/supertux2.profile /usr/share/defaults/firejail/synfigstudio.profile /usr/share/defaults/firejail/tar.profile + /usr/share/defaults/firejail/telegram-desktop.profile /usr/share/defaults/firejail/telegram.profile + /usr/share/defaults/firejail/thunar.profile /usr/share/defaults/firejail/thunderbird.profile + /usr/share/defaults/firejail/torbrowser-launcher.profile /usr/share/defaults/firejail/totem.profile + /usr/share/defaults/firejail/tracker.profile + /usr/share/defaults/firejail/transmission-cli.profile /usr/share/defaults/firejail/transmission-gtk.profile /usr/share/defaults/firejail/transmission-qt.profile + /usr/share/defaults/firejail/transmission-show.profile + /usr/share/defaults/firejail/truecraft.profile + /usr/share/defaults/firejail/tuxguitar.profile /usr/share/defaults/firejail/uget-gtk.profile /usr/share/defaults/firejail/unbound.profile + /usr/share/defaults/firejail/unknown-horizons.profile /usr/share/defaults/firejail/unrar.profile /usr/share/defaults/firejail/unzip.profile /usr/share/defaults/firejail/uudeview.profile + /usr/share/defaults/firejail/uzbl-browser.profile + /usr/share/defaults/firejail/viewnior.profile + /usr/share/defaults/firejail/viking.profile /usr/share/defaults/firejail/vim.profile /usr/share/defaults/firejail/virtualbox.profile /usr/share/defaults/firejail/vivaldi-beta.profile + /usr/share/defaults/firejail/vivaldi-stable.profile /usr/share/defaults/firejail/vivaldi.profile /usr/share/defaults/firejail/vlc.profile + /usr/share/defaults/firejail/vym.profile + /usr/share/defaults/firejail/w3m.profile /usr/share/defaults/firejail/warzone2100.profile + /usr/share/defaults/firejail/waterfox.profile /usr/share/defaults/firejail/webserver.net /usr/share/defaults/firejail/weechat-curses.profile /usr/share/defaults/firejail/weechat.profile /usr/share/defaults/firejail/wesnoth.profile + /usr/share/defaults/firejail/wget.profile /usr/share/defaults/firejail/whitelist-common.inc /usr/share/defaults/firejail/wine.profile + /usr/share/defaults/firejail/wire.profile + /usr/share/defaults/firejail/wireshark-gtk.profile + /usr/share/defaults/firejail/wireshark-qt.profile + /usr/share/defaults/firejail/wireshark.profile /usr/share/defaults/firejail/xchat.profile + /usr/share/defaults/firejail/xed.profile + /usr/share/defaults/firejail/xfburn.profile + /usr/share/defaults/firejail/xfce4-dict.profile + /usr/share/defaults/firejail/xfce4-notes.profile + /usr/share/defaults/firejail/xiphos.profile + /usr/share/defaults/firejail/xmms.profile + /usr/share/defaults/firejail/xonotic-glx.profile + /usr/share/defaults/firejail/xonotic-sdl.profile + /usr/share/defaults/firejail/xonotic.profile /usr/share/defaults/firejail/xpdf.profile /usr/share/defaults/firejail/xplayer.profile + /usr/share/defaults/firejail/xpra.profile /usr/share/defaults/firejail/xreader.profile /usr/share/defaults/firejail/xviewer.profile /usr/share/defaults/firejail/xz.profile /usr/share/defaults/firejail/xzdec.profile + /usr/share/defaults/firejail/yandex-browser.profile + /usr/share/defaults/firejail/youtube-dl.profile /usr/share/defaults/firejail/zathura.profile + /usr/share/defaults/firejail/zoom.profile /usr/share/doc /usr/share/man - - 2017-03-18 - 0.9.44.10 + + 2017-09-09 + 0.9.50 Packaging update Pierre-Yves - pyu@skynet.be + pyu@riseup.net - \ No newline at end of file +