Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <KN_TQotLatAri5wrOvD-713YsGUE_Slhytf8p8fywmPlELdOZhnceWk_tldcKnaBIBZoJUajwZNkGu6xzj38x6JsQtyMzBpcNwOeHe3fa9E=@protonmail.ch>
Date: Mon, 22 Apr 2024 14:33:56 +0000
From: Jordan Glover <Golden_Miller83@...tonmail.ch>
To: oss-security@...ts.openwall.com
Subject: Re: Linux: Disabling network namespaces

On Sunday, April 21st, 2024 at 10:06 PM, Solar Designer <solar@...nwall.com> wrote:

> In what exact way would nested namespaces bypass the security design of
> Flatpak? Is this about the kernel's attack surface exposed by
> capabilities in a namespace or something else? I guess capabilities are
> also dropped in the nested namespace?

In flatpak, apps in container communicate with host through portals[1] using dbus.
Portals identify particular app through unique appid (i.e. "org.mozilla.firefox"
for firefox) and grant some permissions according to that. appid is read from
/.flatpak-info that exist inside container and is immutable there. If namespaces
were available inside sandbox then malicious app could leverage mount namespace
to mount crafted /.flatpak-info containing arbitrary data and lie to the portal
about appid - it could tell portal that it's org.mozilla.firefox when it isn't.

[1] https://github.com/flatpak/xdg-desktop-portal

Jordan

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.