Harden access to PipeWire via pw_security_context #26

Open
opened 2025-11-15 12:40:34 +09:00 by ophestra · 0 comments
Owner

Pipewire provides pw_security_context which is similar to wayland security-context-v1 that hakurei already supports. Flatpak currently does not appear to make use of this protocol.

The /.flatpak-info hack described in #21 is vulnerable to a confused deputy attack and race condition which this protocol is secure against. It is, however, not yet known whether the secure screen sharing protocol is usable through this, but a quick read of the source code suggests that is only possible via the /.flatpak-info hack.

Pipewire provides [pw_security_context](https://docs.pipewire.org/group__pw__security__context.html) which is similar to wayland `security-context-v1` that hakurei already supports. Flatpak currently does not appear to make use of this protocol. The `/.flatpak-info` hack described in #21 is vulnerable to a confused deputy attack and race condition which this protocol is secure against. It is, however, not yet known whether the secure screen sharing protocol is usable through this, but a quick read of the source code suggests that is only possible via the `/.flatpak-info` hack.
ophestra added the
Reviewed
Confirmed
Kind
Security
Priority
Critical
labels 2025-11-15 12:40:34 +09:00
ophestra added a new dependency 2025-11-15 12:43:05 +09:00
Sign in to join this conversation.
No description provided.