mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #22] Firefox crashes with default profile if Zotero addon is enabled #13
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#13
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @yourcelf on GitHub (Aug 13, 2015).
Original GitHub issue: https://github.com/netblue30/firejail/issues/22
Zotero is a commonly used free open source citation manager.
If the zotero addon is enabled, invoking
firejail firefoxresults in firefox crashing on startup.@ghost commented on GitHub (Aug 13, 2015):
What output and error messages does firejail produce? If you could copy and paste the output of the firejail run, that would really help.
@yourcelf commented on GitHub (Aug 13, 2015):
Not much help, I'm afraid:
firejail --debug firefoxThe GLib messages at the bottom are identical to what firefox prints on a run without firejail, when it runs successfully.
The firejail process remains running, but the firefox child process shows <defunct>:
ps aux | grep firefox@ghost commented on GitHub (Aug 13, 2015):
Thanks for that! Can you confirm which version of firejail you're running, and also whether you compiled it yourself or downloaded a binary from somewhere?
@yourcelf commented on GitHub (Aug 13, 2015):
version 0.9.28, 64-bit deb installed from http://sourceforge.net/projects/firejail/files/firejail/firejail_0.9.28_1_amd64.deb. Installed on Ubuntu Trusty.
uname -a:@ghost commented on GitHub (Aug 13, 2015):
OK, I've reproduced this with the latest version of firejail from git, and Zotero downloaded from the link you gave. If you check the dmesg output it says something like this, showing that firejail has blocked a syscall:
This shows
syscall=133which ismknod(see the debug output from firejail you sent). Basically this means that whatever this Zotero thing is, it's trying to create a device file in the filesystem - most probably a FIFO, as I can't see why it would need to create a block or character device.If this is OK with you, you need to change the
seccompline in the file/etc/firejail/firefox.profileto allow mknod calls.Basically firejail is working and is suspicious of Zotero, as by default it doesn't expect Zotero to be there. You have to reduce firejail's security to get it to run.
One thing I would say is that it wasn't obvious what's going on - firejail needs to handle it better when a syscall is blocked.
@yourcelf commented on GitHub (Aug 13, 2015):
Thanks, that makes sense. Zotero probably does this for inter-process communication with its standalone client and libreoffice plugin. Looking over the docs, I don't see a way to override the default list dropped by
seccompto just enable mknod -- followingseccompwithseccomp.keep mknodappears to allow themknodsyscall and no others, preventing firefox from launching.So I've tried removed argument-less
seccompline from/etc/firejail/firefox.profileand replaced it with:That list is taken from the release notes on 0.9.24, with
mknodremoved. As long as the default blacklist doesn't change, should this have the same effect asseccompalone, but enablingmknod?@ghost commented on GitHub (Aug 13, 2015):
Yes, that looks correct to me - that should blacklist all the usual calls except
mknod. Does that make it work correctly for you?@yourcelf commented on GitHub (Aug 13, 2015):
It appears to, yes! Thank you.
@netblue30 commented on GitHub (Aug 18, 2015):
I have removed mknod from the default seccomp in the code for the upcoming 0.9.30 version.