Easy escape on systems running the i3 window manager via IPC socket #6357
-
I'm wondering whether this should be filed as a bug in Firejail's default profile or not: The i3 window manager allows other processes to communicate with it via a UNIX domain socket:
On my system, the location ends up being The IPC interface exposed over this socket includes functionality to make the i3 process execute arbitrary shell scripts, e.g.:
It's easy to prevent this by blacklisting the socket location (or better yet preventing UNIX socket connections altogether), but at least on my system, Firejail does not do this by default and so it's trivial to break out of the default sandbox. But the default sandbox also allows X11 access, which, as far as I understand it, also allows escaping easily. So I'm unsure whether this should be considered a "bug" in the default sandbox or not. |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
|
Beta Was this translation helpful? Give feedback.
-
Interesting observations.
Are you referring to the i3.profile in this context (which isn't auto-enabled in firecfg)? |
Beta Was this translation helpful? Give feedback.
-
Related: #6361. |
Beta Was this translation helpful? Give feedback.
Related: #6361.