[Webkit-unassigned] [Bug 219196] New: [GTK] Sandbox in Flatpak
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Fri Nov 20 02:11:56 PST 2020
https://bugs.webkit.org/show_bug.cgi?id=219196
Bug ID: 219196
Summary: [GTK] Sandbox in Flatpak
Product: WebKit
Version: Other
Hardware: Unspecified
OS: Unspecified
Status: NEW
Severity: Normal
Priority: P2
Component: WebKitGTK
Assignee: webkit-unassigned at lists.webkit.org
Reporter: mcrha at redhat.com
CC: bugs-noreply at webkitgtk.org
I suggest to disable sandbox (mimic WEBKIT_FORCE_SANBOX=0) when the application runs in a Flatpak sandbox. The current behavior just means to run a sandbox in a sandbox, which feels like an overhead. I know the "attacker" can get to the application data, but not to the system data, thus it should be fine. More or less.
I've got this idea after seeing a Flatpak-related downstream print bug report:
https://gitlab.gnome.org/GNOME/evolution/-/issues/1236
which you may or may not consider covered by the bug #202363.
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20201120/4c08cf68/attachment.htm>
More information about the webkit-unassigned
mailing list