Files
flatpak/common
Simon McVittie 270701f900 run: Handle unknown syscalls as intended
The error-handling here was

    if (r < 0 && r == -EFAULT)

but Alex says it was almost certainly intended to be

    if (r < 0 && r != -EFAULT)

so that syscalls not known to libseccomp are not a fatal error.

Instead of literally making that change, emit a debug message on -EFAULT
so we can see what is going on.

This temporarily weakens our defence against CVE-2021-41133
(GHSA-67h7-w3jq-vh4q) in order to avoid regressions: if the installed
version of libseccomp does not know about the recently-added syscalls,
but the kernel does, then we will not prevent non-native executables
from using those syscalls.

Resolves: https://github.com/flatpak/flatpak/issues/4458
Signed-off-by: Simon McVittie <smcv@collabora.com>
(cherry picked from commit d419fa6703)
2021-10-08 18:44:18 +02:00
..
2019-02-25 18:12:30 +00:00
2021-02-09 09:36:59 +01:00
2018-05-24 11:59:52 +00:00
2018-10-08 08:36:23 +00:00
2020-09-15 08:58:49 +02:00
2019-04-08 12:50:42 +00:00