-
-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Forcing --no-sandbox is not a solution #3573
Comments
Running |
Setting the SUID bit on chrome-sandbox via |
On Debian 11 the Setting the SUID bit on the helper is deprecated in Chromium, the aim is to replace it with the namespace sandbox (which is the default right now): explainer. All maintained kernel versions already support the namespace sandbox. I think an ideal solution right now would be to have a helper that adds |
I just remove it from the .desktop file whenever I do an update and Signal seems to start just fine (Ubuntu 20.04.3 LTS). |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
seems like a serious security/privacy issue, no? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Stalebot is great :) |
stale-bot is the only one interested on "working" on the ticket. IIRC, aving kernel.unprivileged_userns_clone=1 has had multiple security problems / right escalations in the past. signal-desktop only needs the capability at start-up, but temporarily enabling capabilities for that time span also needs root and that doesnt seem like a proper workaround either. |
This is a security vulnerability and it has not been addressed yet. The Electron documentation explicitly recommends against this:
I found out about this by chance as I was looking at running processes and I noticed the I find it quite concerning that a security-oriented app like Signal goes against "highly recommended" security practices and seems to give little consideration to complaints for over 5 years. Messaging apps can and do be targeted as an attack vector to break into the OS -- see Pegasus. I'm not a sandbox expert, but I'd expect sandboxing to provide at least some degree of protection against that kind of threat. The Signal app seems to work perfectly on Ubuntu without the
This automatically overrides the Signal entry in the app menu. But this is clearly not the right solution for the average user and also means that any future (potentially important) changes to the packaged-owned .desktop file are overridden too. |
Hi @korg91, the next beta release of Signal Desktop (7.38) removes the |
Do these upstream updates also cancel the need for mounting If user namespaces are used, then no need to write executable ont the host's |
Bug Description
Slapping
--no-sandbox
into the desktop file, and therefore disabling all sandboxing, is not a proper fix. Electron Version 5 improved security for electron-based applications. It doesn't help anyone when those features are disabled entirely.Problem was introduced in this commit:
1ca0d82
Problem could be resolved in a similar way to this commit:
element-hq/element-web@56674ea
I just hope I can bring this successfully to your attention, since I would consider it a serious problem when a software like Signal simply dismisses the security gains by proper Sandboxing.
The text was updated successfully, but these errors were encountered: