On Sunday, April 21st, 2024 at 10:06 PM, Solar Designer <so...@openwall.com> 
wrote:

> In what exact way would nested namespaces bypass the security design of
> Flatpak? Is this about the kernel's attack surface exposed by
> capabilities in a namespace or something else? I guess capabilities are
> also dropped in the nested namespace?

In flatpak, apps in container communicate with host through portals[1] using 
dbus.
Portals identify particular app through unique appid (i.e. "org.mozilla.firefox"
for firefox) and grant some permissions according to that. appid is read from
/.flatpak-info that exist inside container and is immutable there. If namespaces
were available inside sandbox then malicious app could leverage mount namespace
to mount crafted /.flatpak-info containing arbitrary data and lie to the portal
about appid - it could tell portal that it's org.mozilla.firefox when it isn't.

[1] https://github.com/flatpak/xdg-desktop-portal

Jordan

Reply via email to