-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signal 1.27.1 will not run #92
Comments
same symptom for me also on Fedora 30/x86_64. I tried fiddling with the permissions as the error suggested but still couldn't get it working so ended up downgrading to 1.26.2. |
There is a workaround where you could add flatpak run org.signal.Signal --no-sandbox However, I'm not sure if this has any security impact or what it does. It's electron's "fault". |
Same problem here on Fedora 30 |
This seems to be linked to the recent Electron version. electron/electron#17972 Judging that flatpak already does sandboxing, we could disable it for the app. |
In case it's of any interest, the Wire Flatpak is also using |
Upstream is disabling the sandbox signalapp/Signal-Desktop@1ca0d82 |
Same problem here on Fedora 30. I tried to
but it didn't worked. The chrome-sandbox still fails and strace shows the clone() syscall with CLONE_NEWUSER failing
I suppose this is intentional in flatpak as you already apply a sandbox and SETUID binaries are turned off by default (or you would be able to escape the sandbox I guess). It also makes sense that you cannot create a new namespace as creating a new namespace is a way of acquiring capabilities, so it needs to be forbidden. It's a bit confusing to be honest, maybe I misunderstood how it works. Running with The question might be: is the flatpak sandbox as good as the chrome-sandbox so the latter can be safely disabled without regrets? And also: does it even make sense to rely on the sandbox of a flatpak application where you usually assume you don't have to completely trust the app itself (and that's the reason you sandbox it in the first place)? Signal has unrestricted access to /home however, so so long for not trusting it. But that's going to stay, chrome-sandbox or not, and I don't think the chrome-sandbox helps more in protecting /home, does it? |
The underlaying issue can be found here electron/electron#17972 and flatpak/flatpak#3044. While Electron/Chromium is using suid there seems to be no other solution than running with |
Same problem with 1.27.2 |
Yes, I'm sorry. I thought the fix from upstream would transfer into the package but it doesn't. It should now, as the call script now also includes |
When trying to start Signal 1.27.1, it fails to load with the following error:
`
$ flatpak run org.signal.Signal
[2:0906/090612.388077:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /app/Signal/chrome-sandbox is owned by root and has mode 4755.
`
This is on an up-to-date Fedora 30 system on an x86_64 desktop computer.
The text was updated successfully, but these errors were encountered: