Simon McVittie f015f91dc3 run: Prevent TIOCLINUX ioctl, the same as TIOCSTI
The TIOCLINUX ioctl is only available on Linux virtual consoles such as
/dev/tty1. It has several Linux-specific functions, one of which is a
copy/paste operation which can be used for attacks similar to TIOCSTI.

This vulnerability does not affect typical graphical terminal emulators
such as xterm, gnome-terminal and Konsole, and Flatpak is primarily
designed to be run from a Wayland or X11 graphical environment, so this
is relatively unlikely to be a practical problem.

CVE-2023-28100, GHSA-7qpw-3vjv-xrqp

Resolves: https://github.com/flatpak/flatpak/security/advisories/GHSA-7qpw-3vjv-xrqp
Signed-off-by: Simon McVittie <smcv@debian.org>
2023-03-16 09:55:13 +00:00
2023-02-06 14:20:44 +00:00
2019-04-08 12:50:42 +00:00
2023-02-18 14:08:27 +00:00
2023-03-06 15:48:29 +00:00
2021-03-10 10:33:51 +01:00
2018-02-05 15:21:40 +00:00
2023-02-27 12:23:08 +00:00
2015-03-31 15:36:29 +01:00
2022-10-28 13:07:15 +01:00
2023-02-27 12:23:08 +00:00

Flatpak icon

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

See https://flatpak.org/ for more information.

Community discussion happens in #flatpak:matrix.org, on the mailing list, and on the Flathub Discourse.

Read documentation for Flatpak here.

Contributing

Flatpak welcomes contributions from anyone! Here are some ways you can help:

Hacking

See CONTRIBUTING.md

Related Projects

Here are some notable projects in the Flatpak ecosystem:

  • Flatseal: An app for managing permissions of Flatpak apps without using the CLI
  • Flat-manager: A tool for managing Flatpak repositories
Description
No description provided
Readme 68 MiB
Languages
C 91%
Shell 5.1%
Python 1.8%
Meson 1.2%
Yacc 0.8%