mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5462] Regression: custom apparmor profile support resulted in broken Firefox #3004
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3004
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @KOLANICH on GitHub (Nov 9, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5462
Description
7f3b6c19a0(#5274) has resulted in firefox being broken on Kubuntu 21.10 (impish).apparmor-profilesandapparmor-profiles-extraare installed.and resolution of the conflict mitigate the issue.
Steps to Reproduce
Steps to reproduce the behavior
firejailfrom the latest git with apparmor support, install itfirefoxand see it crashedExpected behavior
Actual behavior
masterBehavior without a profile
What changed calling
LC_ALL=C firejail --noprofile /path/to/programin a terminal?Environment
bd119c5ecdChecklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages) - not applicable@rusty-snake commented on GitHub (Nov 9, 2022):
Might be intentionally and not a regression.
@ChrysoliteAzalea commented on GitHub (Nov 12, 2022):
I'd like to ask, is the issue related to the custom AppArmor support, or with specific AppArmor profile? Can Firefox be run with firejail-default or unconfined profile? If it's running under custom AppArmor profile, are there related AppArmor denial messages in the audit journal?
@ChrysoliteAzalea commented on GitHub (Nov 12, 2022):
I've built Firejail from source today, and now I'm running Firefox under Firejail just fine. However, I use a custom AppArmor profile I've written myself (in my case, Firefox runs under firefox//&firejail-default AppArmor domain), and the AppArmor policy may differ between systems. Therefore, it may be an issue with AppArmor denying something important for a browser. For example, it may deny ptrace and signals due to security context mismatch, as well as some D-Bus access (if it's also mediated by AppArmor).
@KOLANICH commented on GitHub (Nov 15, 2022):
--apparmor(includingusr.bin.firefoxused in Ubuntu) doesn't result in any positive changes```apparmor="DENIED" operation="file_lock" profile="firefox" name="~/.cache/mesa_shader_cache/0f/hash.tmp" pid=1047295 comm="firefox:disk$0" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000``
Allowing this dir in firefox aa profile doesn't help.
@curiosityseeker commented on GitHub (Nov 16, 2022):
Same here if I use
apparmor firefoxor, alternatively,
apparmor /etc/apparmor.d/firefoxin my
firefox.local.In other words, it's not working as intended. My custom AA profile is only used with
ignore apparmor.Note also that I've added
include <abstractions/base.d/firejail-base>to my firefox AA profile. See here.@ChrysoliteAzalea commented on GitHub (Nov 17, 2022):
I think that, in order to figure out the reason of a bug, we need to know exactly what is blocked by AppArmor that is needed by Firefox. You can find it in the audit log.
@ChrysoliteAzalea commented on GitHub (Nov 17, 2022):
Alright, this is the profile that I use (note that this profile is using a modified abstraction nameservice2 -- I've made it because of execution rules conflict). Also, there is a xattr attachment -- you may need to remove it or set the extended attribute in order for this profile to attach correctly (as far as I know, it only affects automatic profile attachment and doesn't affect named transitions).
firefoxprofile.tar.gz