Gabriel Corona

Results 40 issues of Gabriel Corona

AFAIU, while the source block device has to be a LV snapshot, the destination can be any block device (AFAIU, it can be any file). The documentation does not state...

Arbitrary code execution through `busctl --address=unixexec:...`: ~~~sh busctl set-property org.freedesktop.systemd1 /org/freedesktop/systemd1 org.freedesktop.systemd1.Manager LogLevel s debug --address=unixexec:path=firefox,argv1=https://www.example.com ~~~

missing-cve-or-writeup

In this proposal, the port is (still) not taken into account. In particular, this claim is somewhat wrong (emphasis mine): > cookies are given an internal scheme component […] >...

When the connection attempt to the upstream DNS server fails, the process dies with: connect: Connection refused

### Context The admonition module supports `???` and `???+` for collapsible admonitions. This is inspired by [mkdocs-material](https://mdit-py-plugins.readthedocs.io/en/latest/#containers). In this case, mdit-py-plugins generates: ```html ``` On the other hand, mkdocs-material [generates](https://squidfunk.github.io/mkdocs-material/reference/admonitions/#collapsible-blocks):...

enhancement

### Before reporting an issue - [X] I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if...

area/authorization-services
kind/bug
help wanted
team/core-iam
status/auto-expire
status/auto-bump
priority/normal

Implementing [security.txt](https://securitytxt.org/) on https://yunohost.org/ would make it easier to report security issues.

:cake: enhancement
:closed_lock_with_key: Security
:factory: Infrastructure

Common action names follow a `can_*` naming pattern. It is not clear, why this pattern is chosen. Why is it `can_read` and not `read? All the examples in the repository...

The current text is: > Tokens should have at least 112 bits of entropy (120-256 is a good range). […] UUID v4 may fit these requirements (122 bits of entropy),...

Should be a requirement about [DPoP proof replay attack protection](https://datatracker.ietf.org/doc/html/rfc9449#name-dpop-proof-replay?) Possible concrete mitigations: * use a server-provided nonce * limit the window of validity of the DPoP proof * "jti"...

V51