Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Runcommand Plugin: make the runcommand plugin more secure by default #1

Merged
merged 1 commit into from
Apr 4, 2021

Conversation

andyholmes
Copy link
Owner

Drop the --talk=org.freedesktop.Flatpak permission and default to
executing commands with flatpak-spawn when available.

Flatpak users will have to manually poke a hole in the sandbox to
execute commands on the host and all users will have to disable the
isolate-subprocesses setting, which comes with a warning.

This is more inconvenient for the common use-case of the plugin, which
typically involves running commands on the host, but it prevents user
plugins from arbitrarily executing commands on the host for flatpak
users.

@andyholmes andyholmes force-pushed the lockdown-runcommand branch 2 times, most recently from 0d62bd7 to 5462594 Compare April 4, 2021 03:57
Drop the `--talk=org.freedesktop.Flatpak` permission and default to
executing commands with `flatpak-spawn` when available.

Flatpak users will have to manually poke a hole in the sandbox to
execute commands on the host and all users will have to disable the
`isolate-subprocesses` setting, which comes with a warning.

This is more inconvenient for the common use-case of the plugin, which
typically involves running commands on the host, but it prevents user
plugins from arbitrarily executing commands on the host for flatpak
users.
@andyholmes andyholmes merged commit 2e16348 into master Apr 4, 2021
@andyholmes andyholmes deleted the lockdown-runcommand branch April 4, 2021 04:07
andyholmes added a commit that referenced this pull request Oct 3, 2024
Unconfirmed, uninstrumented error:

```
WARNING: ThreadSanitizer: unlock of an unlocked mutex (or by a wrong thread) (pid=60215)
    #0 pthread_mutex_unlock <null> (libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf)
    #1 tracker_triples_cursor_reset <null> (libtracker-sparql-3.0.so.0+0x7eb63) (BuildId: 8ba7590a425a128842dbc8ad9aabd1b97b930743)

  Location is global '<null>' at 0x000000000000 (libsqlite3.so.0+0x15d208)

  Mutex M0 (0x7f090a3d8208) created at:
    #0 pthread_mutex_unlock <null> (libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf)
    #1 tracker_triples_cursor_reset <null> (libtracker-sparql-3.0.so.0+0x7eb63) (BuildId: 8ba7590a425a128842dbc8ad9aabd1b97b930743)

SUMMARY: ThreadSanitizer: unlock of an unlocked mutex (or by a wrong thread) (/lib64/libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf) in pthread_mutex_unlock
```
andyholmes added a commit that referenced this pull request Oct 3, 2024
Unconfirmed, uninstrumented error:

```
WARNING: ThreadSanitizer: unlock of an unlocked mutex (or by a wrong thread) (pid=60215)
    #0 pthread_mutex_unlock <null> (libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf)
    #1 tracker_triples_cursor_reset <null> (libtracker-sparql-3.0.so.0+0x7eb63) (BuildId: 8ba7590a425a128842dbc8ad9aabd1b97b930743)

  Location is global '<null>' at 0x000000000000 (libsqlite3.so.0+0x15d208)

  Mutex M0 (0x7f090a3d8208) created at:
    #0 pthread_mutex_unlock <null> (libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf)
    #1 tracker_triples_cursor_reset <null> (libtracker-sparql-3.0.so.0+0x7eb63) (BuildId: 8ba7590a425a128842dbc8ad9aabd1b97b930743)

SUMMARY: ThreadSanitizer: unlock of an unlocked mutex (or by a wrong thread) (/lib64/libtsan.so.2+0x5735c) (BuildId: c8455fafa477dccacaa74df59b23caba0427f5bf) in pthread_mutex_unlock
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant