Sandboxing in Linux is completely broken : linux
I learn flatkill.org and there is one thing that I discovered fascinating since I’m trying into securing apps with Apparmor.
Almost all well-liked functions on flathub include filesystem=host, filesystem=residence or system=all permissions, that is, write permissions to the person residence listing (and extra), this successfully signifies that all it takes to “escape the sandbox” is
echo download_and_execute_evil >> ~/.bashrc. That’s it.
Since apps retailer configuration in hidden recordsdata in the house folder, and so they retailer these recordsdata all over the place, it is very exhausting to sandbox apps in order that they do not attempt to do something humorous with hidden recordsdata in the house folder. I attempted sandboxing Atril with Apparmor and it tries to load plenty of hidden recordsdata of unrelated apps. How it is doable to sandbox apps in the event that they contact one another’s configuration recordsdata?