Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
I
irker
Manage
Activity
Members
Labels
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Locked files
Deploy
Releases
Package Registry
Model registry
Operate
Terraform modules
Analyze
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
iDB
irker
Commits
0d155b6b
Commit
0d155b6b
authored
12 years ago
by
Eric S. Raymond
Browse files
Options
Downloads
Patches
Plain Diff
Note the significance of Python for the security analysis.
parent
fbed38da
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
security.txt
+11
-7
11 additions, 7 deletions
security.txt
with
11 additions
and
7 deletions
security.txt
+
11
−
7
View file @
0d155b6b
...
...
@@ -89,11 +89,15 @@ Our security goals for irker can be enumerated as follows:
== Control Issues ===
We have audited the irker and irkerhook.py code for exploitable
vulnerabilities. We have not found any in the code itself, but the
fact that irkerhook.py relies on external binaries to mine data ought
of its repository opens up a well-known set of vulnerabilities if a
malicious user is able to insert binaries in a carelessly-set
execution path. Normal precautions against this should be taken.
vulnerabilities. We have not found any in the code itself, and the
use of Python gives us confidence in the absence of large classes of errors
(such as buffer overruns) that afflict C programs.
However, the fact that irkerhook.py relies on external binaries to
mine data out of its repository opens up a well-known set of
vulnerabilities if a malicious user is able to insert binaries in a
carelessly-set execution path. Normal precautions against this should
be taken.
== Availability ==
...
...
@@ -237,8 +241,8 @@ The principal advantages of CIA from a security point of view were (a)
it provided a single point at which spam filtering and source blocking
could be done with benefit to all projects using the service, and (b)
since it had to have a database anyway for routing messages to project
channels, the incremental overhead for an authentication feature w
ill
be
relatively low.
channels, the incremental overhead for an authentication feature w
ould
have been
relatively low.
As a matter of fact rather than theory CIA never fully exploited
either possibility. Anyone could create a CIA project entry with
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment