We have an upstream bug about this here:
  http://code.google.com/p/chromium/issues/detail?id=62248

Note that removing the sandbox makes Chromium on a guest account *less secure* 
than Chromium in a normal account.
A sandboxed Chromium does all of the page processing (HTML interpretation, 
running JavaScript) in a process that doesn't have access to the network or 
disk; by contrast, an apparmor-wrapper Chromium without a sandbox runs all of 
that at the same privilege as a normal app.

** Bug watch added: code.google.com/p/chromium/issues #62248
   http://code.google.com/p/chromium/issues/detail?id=62248

-- 
chromium-browser fails to start (guest account, OpenVZ): "Failed to move to new 
PID namespace: Operation not permitted"
https://bugs.launchpad.net/bugs/577919
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to