user@host:~$ flatpak run org.mozilla.firefox
bwrap: Can't find source path /sys/block: Permission denied
user@host:~$
Note: All these hardened features are enabled in my VM:
user@host:~$ flatpak run org.mozilla.firefox
bwrap: Can't find source path /sys/block: Permission denied
user@host:~$
Note: All these hardened features are enabled in my VM:
related feature:
https://www.kicksecure.com/wiki/Security-misc#Reduce_Kernel_Information_Leaks
flatpak requires /sys/block
it. See this highlighted line:
reported upstream:
workaround:
https://www.kicksecure.com/wiki/Security-misc#Whitelisting_Applications
[workstation user ~]% flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
error: Flatpak system operation ConfigureRemote not allowed for user
zsh: exit 1 flatpak remote-add --if-not-exists flathub
Current flatpak running from whonix-ws qubes.
Caused by:
After couple of testing, yeah only A (hide-hardware-info) reproduce it clearly.
Add to it this as well:
Qubes specific: If user removed qubes-core-agent-passwordless-root he will get this issue.
so to correctly address the issues here:
bwrap: Can't find source path /sys/block: Permission denied
Due to hide hardware information
error: Flatpak system operation ConfigureRemote not allowed for user
Due to user removed qubes-core-agent-passwordless-root package from his VM in Qubes.
Note: if both are enabled, it will just show Issue (2)
flatpak: thanks to Make /sys hardening optional and allow access to /sys/fs to make polkit work by DanWin ยท Pull Request #204 ยท Kicksecure/security-misc ยท GitHub this is now fixed. Also discussed here: improve hide-hardware-info.service, make `/sys` hiding optional and enable by default ยท Issue #172 ยท Kicksecure/security-misc ยท GitHub
This is now in the testers repository.
This is now in the stable repository.
Both of these issues are now fixed.
Was merged by flatpak. Will take a while (probably until Debian trixie
) until this fix will arrive.
Therefore this issue was now solved by upstream flatpak.