-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't start in Debian Buster #31
Comments
Hello, This isn't echo 'kernel.unprivileged_userns_clone=1' >> /etc/sysctl.conf
sysctl -p
bash -c 'chmod -s $(which bwrap)'
bash -c 'dpkg-statoverride --add --update root root 0755 $(which bwrap)' |
Ah, thanks! |
I am not sure if it's that big of a deal but you should know Debian is the only major distro that has user namespaces disabled. All the other distros and the official linux kernel don't disable user namespaces by default and actually can't disable user namespaces. Even Ubuntu which is based on Debian has it enabled. There have been some vulnerabilities with enabling that feature (all the known ones are fixed now) but I don't think it should be that concerning for the majority of users. For the most part it's safe |
grsecurity has a patch similar to the one that Debian uses but that is about it |
Thank you very very much for your kind explanations. |
See also discussion in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898446 |
The dialog should probably say more info, it's not super descriptive atm... |
It seems that next debian version will have unpriv user ns by default. |
Reported to Debian. |
@Doc73 apologies for the delay, what's the output of
also, do you see any errors when you |
No errors wen running Chromium from the CLI; only the window above posted |
You didn't removed setuid bit from bwrap, you may follow instructions from https://github.com/flathub/org.chromium.Chromium/blob/master/portal_error.txt#L17 to fix that (This is also what the window above tells you to do 😄). |
@Erick555 |
I'll add an updated message to #89 when it gets merged in. EDIT: Indeed, the setuid bit was re-added in early January:
|
Dear Mantainers,
This is the error I receive every time I try to run chromium:
Your Flatpak version does not support the expose-pids flag, which means that Chromium is unable to run. This generally happens if your distro's bubblewrap installation is setuid instead of using user namespaces.
I'm running Debian Buster AMD64.
I installed chromium a few minutes ago.
Many thanks and best regards,
DC
The text was updated successfully, but these errors were encountered: