Sony Is Suing Tencent Over Shameless Horizon Knock-off Game
Read more of this story at Slashdot.
Man and woman 'jumped' 200ft to their deaths from cliff in front of horrified onlookers at seaside beauty spot
How to lose your holiday half-a-stone FAST: Diet experts reveal the 14 sure-fire tricks that really work... and no you HAVEN'T heard them all before
Three-year-old girl dies and woman arrested on suspicion of murder as police descend on house
Microsoft removes the whiff of Vista from Windows 11 Insider Preview
Great news! Microsoft has finally squashed a Windows 11 Insider bug. No, it still hasn't "Made the Start Menu Great Again." No, you still can't drag the taskbar wherever you like. But yes, it simply kills the bug that played the Windows Vista boot chime on startup.…
Arm plots move up the stack with push into end-to-end silicon
Chip designer Arm says it is looking to bring more compute subsystems, chiplets, and even end-to-end solutions to market as customers increasingly expect a more complete starting point for their custom silicon.…
Epping hotel live protests updates as demonstrations continue for third week
I've lost 6 stone on Mounjaro - this is the food I've still enjoyed while dropping the weight
Record number of foreign sex offenders and violent criminals now held in English and Welsh prisons after sharp rise
Rolls-Royce shares have rocketed 1,000% and made investors a fortune. Experts reveal whether it's time to buy, sit tight or cash in your gains
Braintree Village enjoys boost with rise in both sales and visitors
New partnership could see banking service opened inside Braintree library
Sorry, Prime Minister! No newborns called Keir since the PM took office - but Angela, Boris and Nigel are still in vogue
Brothers face retrial next year for 'attack on male police officer' at Manchester Airport
I've styled thousands of the over-60s and know every anti-ageing trick there is. These are the secret weapons that make outfits work... and you the envy of your friends, says JESSICA CARROLL
Nottingham Forest transfer news: Nuno Espirito Santo's five demands for final month of window, the four players heading for the exit and latest on James McAtee
UN posts video of hundreds of Palestinians swarming around their cars 'and gunshots fired near crowds' at Gaza aid site amid escalating Hamas-Israel war of words over 'starvation' crisis
Horrifying new video showing Black Hawk's deadly mid-air crash with American Airlines jet is played at hearing as final words of chopper pilot are revealed
Kremlin goons caught abusing ISPs to spy on Moscow-based diplomats, Microsoft says
Russian cyberspies are abusing local internet service providers' networks to target foreign embassies in Moscow and collect intel from diplomats' devices, according to a Microsoft Threat Intelligence warning.…
When Flatpak’s Sandbox Cracks: Real‑Life Security Issues Beyond the Ideal
Flatpak promises a secure runtime for Linux applications through container-like isolation, relying on bubblewrap namespaces, syscall filtering, and portal interfaces. In theory, each app should operate inside a strong sandbox, disconnected from the host system. But in reality, experience shows gaps, tiny cracks through which apps may escape with serious consequences.
The Sandbox Promise… and the RealityFlatpak applications begin life in a highly-restricted environment: no network by default, no access to host files beyond the runtime and a private data directory, limited syscalls, and restricted access to session or system services. Portals provide a controlled channel for granting specific capabilities (e.g. file dialogs, screenshot, printing) without broad privileges.
Yet, many Flatpak packages declare broad permissions like filesystem=home, filesystem=host, or device=all. That effectively grants full read-write access to the user's home directory or even system devices, defeating the purpose of the sandbox in practice. Users often assume that 'sandboxed' means locked-down, but blanket permissions expose them to risk.
Real-World Breakouts from the Sandbox CVE‑2024‑32462: RequestBackground Portal AbuseSecurity researcher Gergo Koteles uncovered a high-severity vulnerability where malicious Flatpak apps could craft a .desktop file via the org.freedesktop.portal.Background.RequestBackground interface. That tricked Flatpak’s --command= parsing into injecting bwrap arguments (e.g. --bind). This allowed arbitrary host commands to execute outside the sandbox boundary. Versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8 were affected. Patched in the listed versions and mitigated in xdg-desktop-portal 1.18.4 and newer.
CVE‑2024‑42472: Persistent Data Symlink ExploitA Flatpak flag, --persist (or persistent= in manifest), allows apps writable storage within their data directory. But if a malicious install replaces that directory with a symlink pointing to sensitive host folders (e.g. ~/.ssh), the sandbox mount entry follows it into the real filesystem, giving the app unintended access to files outside its name-spaced area. All versions up to 1.14.8 and 1.15.x ≤ 1.15.9 are vulnerable; patched in 1.14.10 and 1.15.10+.
Policy Complexity and Ecosystem Slip-UpsA detailed study of hundreds of Flatpak and Snap packages found that nearly 42% of Flatpak apps either override the supposed isolation or misconfigure sandboxing, resulting in overprivilege or potential escape paths. Crafting fine-grained sandbox policy is hard, and mistakes slip through easily.
Go to Full Article