Binary: https://github.com/brave/brave-browser/releases/download/v0.55.21/brave-browser_0.55.21_amd64.deb
OS:; archlinux
kernel: 4.19.0
Log
trap' para punto de parada/seguimiento (core' generado)
dmesg log
[28488.802310] traps: brave[21676] trap int3 ip:55812609b770 sp:7ffeb929bd90 error:0 in brave[558123e06000+65e2000]
[28488.802396] audit: type=1701 audit(1540863866.209:131): auid=1000 uid=1000 gid=1000 ses=2 pid=21676 comm="brave" exe="/opt/brave.com/brave/brave" sig=5 res=1
also
it works with --no-sandbox flag
cc @mbacchi
A commonly-quoted workaround is enabling unprivileged user namespaces using
sudo sysctl kernel.unprivileged_userns_clone=1
However, before doing that, see this reply on arch-general for why it's not enabled by default.
Note also that (from the link above):
Moreover there are many applications that use this feature to provide or enhance security
Among them are:lxc, systemd-nspawn, docker, flatpak, bubblewrap, firejail, firefox, chromium
There's one well-written sandbox there (Chromium's usage) and it doesn't require this feature.
Which is true: Chromium works just fine on Arch with the defaults, so I don't see a reason why Brave shouldn't.
Related: #1986 (same for Debian)
@Liunkae I believe this issue should be reopened, and had mentioned it with @bbondy in the related PR. Two reasons:
Please, please consider a better sandboxing solution. This is an opportunity for Brave to lead and do better than Chromium.
This was also reported in #6247 and fixed in https://github.com/brave/brave-core/pull/4223.
Most helpful comment
@Liunkae I believe this issue should be reopened, and had mentioned it with @bbondy in the related PR. Two reasons:
Please, please consider a better sandboxing solution. This is an opportunity for Brave to lead and do better than Chromium.