firejail

Description:Security sandbox for any type of processes
License: GPL-2
Homepage:https://firejail.wordpress.com/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
0.9.60-r1 - + - - - - - - - - - - ~

USE flags

  • apparmor - Enable support for custom AppArmor profiles
  • chroot - Enable chrooting to custom directory
  • contrib - Install contrib scripts
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • file-transfer - Enable file transfers between sandboxes and the host system
  • globalcfg - Enable global config file
  • network - Enable networking features
  • overlayfs - Enable overlayfs
  • private-home - Enable private home feature
  • seccomp - Enable system call filtering
  • suid - Enable setuid root program, with potential security risks
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • userns - Enable attaching a new user namespace to a sandbox (--noroot option)
  • vim-syntax - Pulls in related vim syntax scripts
  • whitelist - Enable whitelist
  • x11 - Enable X11 sandboxing

Security Advisory

Date Severity Title
almost 3 years high Firejail: Privilege escalation
almost 3 years normal Firejail: Multiple vulnerabilities
almost 3 years normal Firejail: Multiple vulnerabilities

Also available in: Atom

Thank you!