tdesktop/Telegram
John Preston a0e2a925ee Filter command line arguments passed to Qt.
See https://www.bleepingcomputer.com/news/security/
qt5-based-gui-apps-susceptible-to-remote-code-execution/

This RCE exploit doesn't affect Telegram Desktop directly, because
Telegram Desktop uses statically linked Qt and does not load any
plugins from external shared libraries. But in any case it's better
to control how command line arguments can affect the app behaviour.

For now pass only the first command line part, the executable path.
2019-05-06 12:40:04 +02:00
..
build Closed alpha version 1.6.7.2. 2019-05-01 16:11:45 +04:00
gyp Count unread correctly in folders. 2019-05-01 16:11:37 +04:00
Patches Enable hardened runtime on macOS build. 2019-04-23 19:24:36 +04:00
Resources Update some icons. 2019-05-03 15:35:22 +04:00
SetupFiles initial commit for 0.4.18 version of Telegram Desktop 2014-05-30 12:53:19 +04:00
SourceFiles Filter command line arguments passed to Qt. 2019-05-06 12:40:04 +02:00
Telegram Enable hardened runtime on macOS build. 2019-04-23 19:24:36 +04:00
ThirdParty Closed alpha version 1.6.3.6: Update to VS 2019. 2019-04-04 20:51:42 +04:00
create.bat Use single LEGAL file with license and copyright. 2018-01-03 13:23:14 +03:00
Telegram.plist Add LSFileQuarantineEnabled to the .plist 2019-01-29 14:52:33 +03:00