Skip to content

Signal no-intervention update grants RCE to Signal developers and others #4578

@sneak

Description

@sneak
  • I have searched open and closed issues for duplicates

Bug Description

Signal automatically downloads new code and places it on my machine to be run without my interaction or consent.

This code could contain malicious software, and I am presented no opportunity to stop this process.

No-interaction autoupdate that cannot be disabled is unacceptable in security software, as it allows anyone who compromises the release process (or any of the credentials that allow the developers to operate the release process) to automatically download malicious code to my machine without my intervention.

Steps to Reproduce

  1. run signal
  2. there is no step two. code you've never seen will be automatically downloaded to your machine, and will run the next time you (or anyone else) launches Signal.

Expected Result:

Auto-update requires an opt in from the user to grant Signal developers this ability to automatically execute unreviewed apps or code.

Downloading and running of updates without user intervention or approval are, by definition, remote code execution (RCE) ability to whoever can publish updates, as well as whoever can coerce those people to publish updates (e.g. national governments or militaries).

Platform Info

Signal Version: v1.36.3

Resolution

The ability to disable no-intervention updates is essential. This is not a "feature request": without this, any machines running this software are vulnerable to attack by anyone who can compromise the release process, including hosting providers and many others.

Most users will, of course, wish to enable automatic updates, and Signal developers of course want everyone running the latest authorized version. The problem is that software that replaces its own code from the network without user intervention means that it will also run any unauthorized version released, as well. A subset of the userbase relies, possibly even for their own physical safety, on the ability to run only authorized Signal releases.

Please provide us an option for disabling automatic update, and close the RCE hole.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions