summaryrefslogtreecommitdiff
path: root/_security/index.html
diff options
context:
space:
mode:
authorAilin Nemui <ailin@z30a.localdomain>2018-02-14 00:54:53 +0100
committerAilin Nemui <ailin@z30a.localdomain>2018-02-14 23:06:37 +0100
commit813c12822a68983ab42905f5af364dcc9c7ffcdd (patch)
treeb8e8986b0f1bfad0e20809b78b0e9a1a3235ce16 /_security/index.html
parent21f070359fe8174573deea8fea19ccd95dc3e51d (diff)
downloadirssi.github.io-813c12822a68983ab42905f5af364dcc9c7ffcdd.zip
enable security collections
Diffstat (limited to '_security/index.html')
-rw-r--r--_security/index.html105
1 files changed, 105 insertions, 0 deletions
diff --git a/_security/index.html b/_security/index.html
new file mode 100644
index 0000000..af51403
--- /dev/null
+++ b/_security/index.html
@@ -0,0 +1,105 @@
+---
+layout: page
+title: Security
+permalink: security/
+---
+
+Please report security issues to staff&#64;irssi&#46;org. Thanks!
+
+<h2>Past issues overview</h2>
+<table class="table">
+ <thead>
+ <tr class="text-nowrap">
+ <th colspan="2">Links</th>
+ <th>Exploitable</th>
+ <th colspan="3">Versions affected</th>
+ <th>Fixed</th>
+ <th>Credit</th>
+ <th colspan="2">Description</th>
+ </tr>
+ </thead>
+{% assign advisories = site.data.security %}
+{% for advisory in advisories reversed %}
+ <tbody>
+ <tr>
+ <th colspan="3">{% if advisory.link %}<a href="{{ advisory.link }}">{{ advisory.name }}</a>{% elsif advisory.name contains "-SA-" %}<a href="{{ site.baseurl }}/security/{{ advisory.name | slugify | replace: '-', '_' }}.txt">{{ advisory.name }}</a>{% else %}{{ advisory.name }}{% endif %}</th>
+ <th colspan="3">{% if advisory.affected_note %}{{ advisory.affected_note }}{% endif %}</th>
+ <th>{% if advisory.git_commit %}<a href="https://github.com/irssi/{% if advisory.repo %}{{ advisory.repo }}{% else %}irssi{% endif %}/commit/{{ advisory.git_commit }}">{{ advisory.release_date }}</a>{% else %}{{ advisory.release_date }}{% endif %}</th>
+ <th colspan="3"></th>
+ </tr>
+ </tbody>
+ <tbody>
+ {% for bug in advisory.bugs %}
+ <tr>
+ <td rowspan="3"></td>
+ <td rowspan="3" class="text-nowrap">
+ {% if bug.name %}
+ <div>{% if bug.link %}<a href="{{ bug.link }}">{{ bug.name }}</a>{% else %}{{ bug.name }}{% endif %}</div>
+ {% endif %}
+ {% if bug.cve %}
+ <div><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name={{ bug.cve }}">{{ bug.cve }}</a></div>
+ {% endif %}
+ {% for link in bug.external_links %}
+ <div><a href="{{ link.url }}">{{ link.id }}</a></div>
+ {% endfor %}
+ </td>
+ <td rowspan="3">{{ bug.exploitable_by }}</td>
+ {% if bug.affected_note_top %}<td class="has-next-row" colspan="4">{{ bug.affected_note_top }}</td>{% else %}
+ <td class="has-next-row">{% if bug.affected_versions.from %}{{ bug.affected_versions.from }}{% else %}*{% endif %}</td>
+ <td class="has-next-row">{% if bug.affected_versions.to %}&ndash;{% endif %}</td>
+ <td class="has-next-row">{{ bug.affected_versions.to }}</td>
+ <td class="has-next-row">
+ {% if bug.git_commit %}<a href="https://github.com/irssi/{% if bug.repo %}{{ bug.repo }}{% else %}irssi{% endif %}/commit/{{ bug.git_commit }}">{{ bug.fixed_version }}</a>{% else %}{{ bug.fixed_version }}{% endif %}
+ </td>
+ {% endif %}
+ <td rowspan="3">{{ bug.credit }}</td>
+ <td rowspan="3">{{ bug.description }}</td>
+ <td rowspan="3"></td>
+ </tr>
+ <tr>
+ {% if bug.affected_note_top %}
+ <td class="has-next-row has-previous-row">{% if bug.affected_versions.from %}{{ bug.affected_versions.from }}{% else %}*{% endif %}</td>
+ <td class="has-next-row has-previous-row">{% if bug.affected_versions.to %}&ndash;{% endif %}</td>
+ <td class="has-next-row has-previous-row">{{ bug.affected_versions.to }}</td>
+ <td class="has-next-row has-previous-row">
+ {% if bug.git_commit %}<a href="https://github.com/irssi/{% if bug.repo %}{{ bug.repo }}{% else %}irssi{% endif %}/commit/{{ bug.git_commit }}">{{ bug.fixed_version }}</a>{% else %}{{ bug.fixed_version }}{% endif %}
+ </td>
+ {% else %}
+ <td class="has-previous-row" colspan="3" rowspan="2">{% if bug.affected_note_bottom %}{{ bug.affected_note_bottom }}{% endif %}</td>
+ <td class="has-previous-row" rowspan="2"></td>
+ {% endif %}
+ </tr>
+ <tr>
+ {% if bug.affected_note_top %}
+ <td class="has-previous-row" colspan="3">{% if bug.affected_note_bottom %}{{ bug.affected_note_bottom }}{% endif %}</td>
+ <td class="has-previous-row"></td>
+ {% endif %}
+ </tr>
+ {% endfor %}
+ </tbody>
+{% endfor %}
+ </tbody>
+</table>
+
+<h2>Reference</h2>
+
+<p>"Exploitable by" column:</p>
+
+<ul>
+ <li>
+ <b>Server</b>: Triggered by malicious inputs sent by a server with complete control over the connection<br />
+ Example: malformed raw IRC commands
+ </li>
+ <li>
+ <b>Client</b>: Triggered by malicious inputs sent by remote clients with no privileges over the network<br />
+ Example: malformed color codes inside a message
+ </li>
+ <li>
+ <b>Local</b>: Exploitable by unprivileged system users with access to the same filesystem<br />
+ Example: CVE-2016-7553 (buf.pl information disclosure)
+ </li>
+ <li>
+ <b>Formats</b>: Exploitable through internal format codes used in themes and configs. These are not normally processed from the network but may be in combination with buggy scripts.<br />
+ Example: CVE-2017-5356 (Crash on <code>%[</code>)
+ </li>
+</ul>