-
Notifications
You must be signed in to change notification settings - Fork 570
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
xauth command is hardcoded to /usr/bin/xauth #6006
Comments
Thank you for reporting this. Similar hardcoded reference to /usr/bin/xauth: firejail/src/firejail/fs_lib2.c Lines 168 to 170 in eb5c971
@netblue30 @smitsohu Can you have a look at this please? |
chestnykh
added a commit
to chestnykh/firejail
that referenced
this issue
Nov 13, 2023
Don't use hardcoded `/usr/bin/xauth`, iterate over directories inside PATH instead. This fixes netblue30#6006
chestnykh
added a commit
to chestnykh/firejail
that referenced
this issue
Nov 13, 2023
Don't use hardcoded `/usr/bin/xauth`, iterate over directories inside PATH instead. This fixes netblue30#6006
chestnykh
added a commit
to chestnykh/firejail
that referenced
this issue
Nov 17, 2023
Don't use hardcoded `/usr/bin/xauth`, iterate over directories inside PATH instead. This fixes netblue30#6006
chestnykh
added a commit
to chestnykh/firejail
that referenced
this issue
Nov 19, 2023
Don't use hardcoded `/usr/bin/xauth`, iterate over directories inside PATH instead. This fixes netblue30#6006
kmk3
added a commit
to kmk3/firejail
that referenced
this issue
Dec 14, 2023
This reverts commit 407c05e. If --private-lib is used (and firejail is configured with --enable-private-lib), the following error occurs: $ firejail --quiet --noprofile --private-lib true firejail: fs_lib.c:56: find_in_path: Assertion `geteuid() != 0' failed. Error: proc 10000 cannot sync with peer: unexpected EOF Peer 10001 unexpectedly killed (Segmentation fault) Given that it causes an uid assertion failure, the logic appears to not be correct and the current behavior may be unsafe, so for now revert that commit until the issue is properly addressed. Relates to netblue30#6006 netblue30#6087. Fixes netblue30#6113.
kmk3
added a commit
that referenced
this issue
Jan 3, 2024
kmk3
changed the title
Xauth binary is hardcoded to /usr/bin/xauth
xauth command is hardcoded to /usr/bin/xauth
Sep 7, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
firejail/src/firejail/x11.c
Lines 1180 to 1186 in eb5c971
Expected behavior
To find the executable in the path, or, at least, have an option to override the path to the binary.
Actual behavior
unix-way
Additional context
Despite the fact in most environments you can find binaries in /usr/bin, there are cases in which you cannot, like in NixOS, containers, small os images, etc.
Environment
NixOS (/usr/bin, as well as /bin are not used for apps like xauth)
Checklist
The text was updated successfully, but these errors were encountered: