Skip to content
This repository has been archived by the owner on May 12, 2021. It is now read-only.

Chrome SUID sandbox prevents AppImage from running #1217

Closed
joeyh opened this issue Nov 28, 2019 · 8 comments
Closed

Chrome SUID sandbox prevents AppImage from running #1217

joeyh opened this issue Nov 28, 2019 · 8 comments

Comments

@joeyh
Copy link

joeyh commented Nov 28, 2019

joey@darkstar:~>bin/patchwork 
[3239:1128/104205.521035:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /home/joey/tmp/.mount_patchwSfbcAw/chrome-sandbox is owned by root and has mode 4755.
Trace/breakpoint trap
 - exit 133

Previous versions have not had this problem.

Linux 5.2.0, Debian unstable

@joeyh
Copy link
Author

joeyh commented Nov 28, 2019

electron/electron#17972

patchwork --no-sandbox works around this electron/debian incompatability. Or enable unprivileged user namespaces, but that weakens the system's security.

@christianbundy
Copy link
Contributor

Thanks for the bug report. Do you have any recommendations on how we should resolve this?

There's a bullet point about this in the release notes and an active discussion about this in #1213, but we don't have a way to set --no-sandbox in the AppImage release and both of the other solutions require root. To make things harder, the SUID solution doesn't work in the AppImage release because it uses a temporary filesystem mounted in /tmp/.

Not sure what the right move is.

cc: @black-puppydog @nornagon maybe let's move the discussion here?

@joeyh
Copy link
Author

joeyh commented Nov 28, 2019 via email

@joeyh
Copy link
Author

joeyh commented Nov 28, 2019 via email

@christianbundy
Copy link
Contributor

Same. I'm thinking maybe we should just add some documentation on the workarounds and add it to the release notes? I don't feel very comfortable advocating for any of these workarounds, and it's hard because there are conflicting perspectives:

@nornagon
Copy link
Contributor

nornagon commented Dec 2, 2019 via email

@christianbundy
Copy link
Contributor

I've opened an issue upstream in electron-builder, but for the time being I've added some documentation in #1218. Would it be wise to automatically add --no-sandbox to the .deb install, since Debian in particular has disabled this feature? Looks like we can do that pretty easily, but it doesn't fix the AppImage.

@black-puppydog black-puppydog changed the title 3.17.1 appimage crash on start Chrome SUID sandbox has wrong ownter in AppImage Jan 11, 2020
@black-puppydog black-puppydog changed the title Chrome SUID sandbox has wrong ownter in AppImage Chrome SUID sandbox has wrong owner in AppImage Jan 11, 2020
@black-puppydog black-puppydog changed the title Chrome SUID sandbox has wrong owner in AppImage Chrome SUID sandbox prevents AppImage from running Jan 11, 2020
@madduck
Copy link

madduck commented Jan 11, 2020

BTW, I can't really recommend --no-sandbox in good conscience, since I don't fully understand what electron is accomplishing with its sandbox. Maybe it's really important for security, or maybe it's not relevant for patchwork, or would only be a useful line of defense if a bug allowed malicious javascript to be embedded in a ssb message and run in the browser.

Fair enough, though I have a hard time imagining what the heck the sandbox could be protecting from, which is mitigated by running code as root.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

5 participants