Catanzaro: On WebKit security updates
We regularly receive bug reports from users with very old versions of WebKit, who trust their distributors to handle security for them and might not even realize they are running ancient, unsafe versions of WebKit. I strongly recommend using a distribution that releases WebKitGTK+ updates shortly after they’re released upstream. That is currently only Arch and Fedora. (You can also safely use WebKitGTK+ in Debian testing — except during its long freeze periods — and Debian unstable, and maybe also in openSUSE Tumbleweed. Just be aware that the stable releases of these distributions are currently not receiving our security updates.)" Lots of information here, worth a read for anybody interested in the topic.
Posted Feb 2, 2016 23:57 UTC (Tue)
by flussence (guest, #85566)
[Link] (9 responses)
Fortunately Google's working to level the playing field (in the nuclear sense) by abandoning x86-32 updates *next month*, hooray!
I guess even the world's smartest software engineers couldn't figure out how to rein in its insane build requirements...
Posted Feb 3, 2016 10:25 UTC (Wed)
by ceplm (subscriber, #41334)
[Link] (4 responses)
Do you like your CoolAid cold or room temperature? What does this article (which is mostly about using WebKit embedded in other apps) have anything to do with the standalone browsers? From the linked article: it doesn't apply to Apple Safari, Mozilla Firefox, and Microsoft stuff, or Chrome.
Posted Feb 3, 2016 12:10 UTC (Wed)
by flussence (guest, #85566)
[Link] (3 responses)
> If the web engine is sandboxed, then a second type of attack, called a sandbox escape, is needed. This makes it dramatically more difficult to exploit vulnerabilities. Chromium has a top-class Linux sandbox. WebKit does have a Linux sandbox, but it’s not any good, so it’s (rightly) disabled by default. Firefox does not have a sandbox due to major architectural limitations (which Mozilla is working on).
So WebKit's half dozen Linux forks (and by extension, 90% of those Linux standalone browsers you say don't matter, including GNOME's default one) don't even make a token effort to protect against unknown-unknowns. Mozilla's long-term plan seems to be copying Chrome down to the minutiae, which is infinitely better than copying IE6's security model (duck, cover and pray). Google, meanwhile, seem to be doing *all* the work in this field, including pushing seccomp and sandboxing in the first place.
Posted Feb 3, 2016 12:47 UTC (Wed)
by ceplm (subscriber, #41334)
[Link] (1 responses)
Posted Feb 3, 2016 13:07 UTC (Wed)
by Mannigfaltigkeit (guest, #103163)
[Link]
Posted Feb 3, 2016 14:47 UTC (Wed)
by pinkpony (guest, #92373)
[Link]
That's a bit of a stretch, on the other hand, it's not a big surprise that a relatively new browser written from scratch would have a much better security model than the one based on 20 years of legacy code. There are weaknesses as well, as mentioned, nobody really likes to build Chromium and push it, meaning many distros don't bother having it at all, some have it in a pretty bad shape, so you get a complete reliance on Google distributing proper (binary only) Chrome updates. Not so easy to say which is more important, once knowingly broken in a certain version and without proper updates, the sandbox isn't that great protection either.
Posted Feb 3, 2016 15:22 UTC (Wed)
by mcatanzaro (subscriber, #93033)
[Link] (3 responses)
Posted Feb 4, 2016 23:35 UTC (Thu)
by flussence (guest, #85566)
[Link] (2 responses)
On the other hand, Chrome is (reluctantly) the main browser on my netbook now. After a long period of browser-hopping I ended up with a list of basic needs — it needs to not take a miserably long amount of time to load pages; to work properly on heavy “Web 2.0” sites; have strong filtering/privacy tools either built in or as extensions; and be installable via package manager (Gentoo's, in this case. I have no problem if it's an overnight job as long as it gets there eventually)
Unfortunately, I had no choice but to cull “FOSS” from the list to meet all the others. I sincerely hope that's not a permanent thing, because as I said initially, Chrome isn't either.
Posted Feb 5, 2016 15:23 UTC (Fri)
by HelloWorld (guest, #56129)
[Link] (1 responses)
And just to be clear: it's perfectly OK to not base your choice of browser on its security. But saying that it's futile doing so because none of them are perfect is a non-sequitur.
Posted Feb 6, 2016 10:28 UTC (Sat)
by flussence (guest, #85566)
[Link]
Posted Feb 3, 2016 4:19 UTC (Wed)
by butlerm (subscriber, #13312)
[Link] (5 responses)
Posted Feb 3, 2016 6:58 UTC (Wed)
by JanC_ (guest, #34940)
[Link]
Posted Feb 3, 2016 14:54 UTC (Wed)
by drag (guest, #31333)
[Link] (2 responses)
Formatting things in HTML + CSS is a pretty common thing. If you want to design a app but you want to use a standard method for formatting text while allowing for colors, images, styles, and whatnot... that you want to have a good chance of working with other types of similar apps... what standard do you want to be using for this? Postfix? PDF? Rich Text Format? Using HTML/CSS is the obvious choice.
Posted Feb 3, 2016 20:18 UTC (Wed)
by butlerm (subscriber, #13312)
[Link] (1 responses)
Posted Feb 4, 2016 7:49 UTC (Thu)
by JanC_ (guest, #34940)
[Link]
Posted Feb 4, 2016 20:31 UTC (Thu)
by rwmj (subscriber, #5474)
[Link]
Posted Feb 3, 2016 7:13 UTC (Wed)
by JanC_ (guest, #34940)
[Link] (2 responses)
So although distros could (and should) certainly do a better job to provide security updates for the benefit of applications that use a supported WebKitGtk+ API, the fact that upstream:
Posted Feb 3, 2016 15:28 UTC (Wed)
by mcatanzaro (subscriber, #93033)
[Link] (1 responses)
Other than that, you're right on the mark.
Posted Feb 5, 2016 11:02 UTC (Fri)
by JanC_ (guest, #34940)
[Link]
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
b) this article was completely not about sandboxing
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
That's like saying that safer sex is a nice ideal, but since there's no such thing as a perfect condom, it's not your main priority in choosing a contraceptive.
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates
a) seems to break their API every couple of years and then stops support for the old API shortly after
b) only started to make people aware of security issues very very recently (and then released a huge number of them at once)
… is certainly not helping here?
Catanzaro: On WebKit security updates
Catanzaro: On WebKit security updates