git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Question about scm security holes
@ 2010-03-04 20:09 walt
  2010-03-05  2:03 ` Avery Pennarun
  2010-03-05 17:47 ` Daniel Barkalow
  0 siblings, 2 replies; 13+ messages in thread
From: walt @ 2010-03-04 20:09 UTC (permalink / raw)
  To: git

I just saw this article about the "google hackers" exploiting weaknesses in scms,
Perforce in particular:

http://www.wired.com/threatlevel/2010/03/source-code-hacks/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29

I guess google didn't take Linus's advice to dump Perforce :)

I can't tell from the article if Perforce is any worse than any other scm for
security holes, in fact it seems to imply that others haven't been tested in
the same way.

Just curious if anyone here has any thoughts about how the article may or may
not have any relevance for git (git being the scm I use most, by far, which is
the reason I'm interested).

Thanks

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2010-03-05 22:26 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-04 20:09 Question about scm security holes walt
2010-03-05  2:03 ` Avery Pennarun
2010-03-05  3:00   ` John Tapsell
2010-03-05  3:19     ` Avery Pennarun
2010-03-05  4:07       ` John Tapsell
2010-03-05  3:20   ` walt
2010-03-05  3:28     ` Avery Pennarun
2010-03-05  7:36   ` Andreas Krey
2010-03-05  9:25   ` Johannes Schindelin
2010-03-05 10:49     ` Jakub Narebski
2010-03-05 18:22     ` Avery Pennarun
2010-03-05 22:33       ` Johannes Schindelin
2010-03-05 17:47 ` Daniel Barkalow

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).