You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Originally reported by @sarayourfriend via security@beeware.org; we've determined that it isn't a security issue, and will instead be treating it as a normal bug fix.
Check the Flatpak manifest.yml for the list of permissions
Expected behavior
Briefcase-generated Flatpak apps shouldn't include the "socket=session-bus" permission by default.
Screenshots
No response
Environment
Operating System: Linux (all)
Python version: all
Software versions:
Briefcase: 0.3.20
Logs
Additional context
While the Flatpak documentation indicates that adding Dbus access poses a security risk, in order to exploit this fact, an app would need to either:
Explicitly be trying to access DBus in application code - in which case the app author themselves are the party being malicious
Include a dependency that tries to access DBus in an inappropriate way - this constitutes a supply chain attack, with Flatpak providing, at best, a layer of protection
Include a code injection exploit in the app's code - in which case DBus access is the least of your problems.
In all three cases, the same app code published as a system package would have no protection; so Flatpak with the extra permission would have the same defect as an app packaged as a system package.
On that basis, we don't consider this a security issue, but a default value for Flatpak packaging that can be improved.
We’ve identified that the permission was added because a test app that was used to verify Flatpak packaging (Toga Tutorial 4) was slightly misconfigured - the Briefcase bundle ID and the ID in the Toga code didn’t match, and as a result, the Flatpak app wasn’t able to access it’s own DBus session. Giving access to the system bus resolved this issue - because it gave access to the whole of DBus.
The text was updated successfully, but these errors were encountered:
Describe the bug
Originally reported by @sarayourfriend via security@beeware.org; we've determined that it isn't a security issue, and will instead be treating it as a normal bug fix.
Flatpak build target defaults to including session bus permissions in the manifest
However, Flatpak's documentation says that including session bus access breaks sandboxing and presents a security risk.
Steps to reproduce
Expected behavior
Briefcase-generated Flatpak apps shouldn't include the "socket=session-bus" permission by default.
Screenshots
No response
Environment
Logs
Additional context
While the Flatpak documentation indicates that adding Dbus access poses a security risk, in order to exploit this fact, an app would need to either:
In all three cases, the same app code published as a system package would have no protection; so Flatpak with the extra permission would have the same defect as an app packaged as a system package.
On that basis, we don't consider this a security issue, but a default value for Flatpak packaging that can be improved.
We’ve identified that the permission was added because a test app that was used to verify Flatpak packaging (Toga Tutorial 4) was slightly misconfigured - the Briefcase bundle ID and the ID in the Toga code didn’t match, and as a result, the Flatpak app wasn’t able to access it’s own DBus session. Giving access to the system bus resolved this issue - because it gave access to the whole of DBus.
The text was updated successfully, but these errors were encountered: