Skip to content

Commit 5e445a1

Browse files
committed
Reorder entries alphabetically, include entries suggested by Victor
1 parent 9a44df1 commit 5e445a1

File tree

5 files changed

+26
-5
lines changed

5 files changed

+26
-5
lines changed

Doc/library/hashlib.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ library that Python uses on your platform. On most platforms the
8080
.. versionadded:: 3.6
8181
:func:`blake2b` and :func:`blake2s` were added.
8282

83+
.. _hashlib-usedforsecurity:
84+
8385
.. versionchanged:: 3.9
8486
All hashlib constructors take a keyword-only argument *usedforsecurity*
8587
with default value ``True``. A false value allows the use of insecure and

Doc/library/logging.config.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,8 @@ in :mod:`logging` itself) and defining handlers which are declared either in
152152
send it to the socket as a sequence of bytes preceded by a four-byte length
153153
string packed in binary using ``struct.pack('>L', n)``.
154154

155+
.. _logging-eval-security:
156+
155157
.. note::
156158

157159
Because portions of the configuration are passed through

Doc/library/multiprocessing.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1187,6 +1187,7 @@ For example:
11871187
>>> arr2
11881188
array('i', [0, 1, 2, 3, 4, 0, 0, 0, 0, 0])
11891189

1190+
.. _multiprocessing-recv-pickle-security:
11901191

11911192
.. warning::
11921193

Doc/library/security_warnings.rst

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,22 @@ Security Considerations
77

88
The following modules have specific security considerations:
99

10-
* :mod:`ssl` : :ref:`SSL/TLS security considerations <ssl-security>`
11-
* :mod:`cgi` : :ref:`CGI security considerations <cgi-security>`
12-
* :mod:`pickle` : :ref:`Restricting globals in pickle <pickle-restrict>`
13-
* :mod:`subprocess` : :ref:`Subprocess security considerations <subprocess-security>`
14-
* :mod:`xml` : :ref:`XML vulnerabilities <xml-vulnerabilities>`
10+
* :mod:`cgi`: :ref:`CGI security considerations <cgi-security>`
11+
* :mod:`hashlib`: :ref:`all constructors take a "usedforsecurity" keyword-only
12+
argument disabling known insecure and blocked algorithms
13+
<hashlib-usedforsecurity>`
14+
* :mod:`http.server` is not suitable for production use, only implementing
15+
basic security checks
16+
* :mod:`logging`: :ref:`Logging configuration uses eval()
17+
<logging-eval-security>`
18+
* :mod:`multiprocessing`: :ref:`Connection.recv() uses pickle
19+
<multiprocessing-recv-pickle-security>`
20+
* :mod:`pickle`: :ref:`Restricting globals in pickle <pickle-restrict>`
21+
* :mod:`random` shouldn't be used for security purposes, use :mod:`secrets`
22+
instead
23+
* :mod:`ssl`: :ref:`SSL/TLS security considerations <ssl-security>`
24+
* :mod:`subprocess`: :ref:`Subprocess security considerations
25+
<subprocess-security>`
26+
* :mod:`xml`: :ref:`XML vulnerabilities <xml-vulnerabilities>`
27+
* :mod:`zipfile`: :ref:`maliciously prepared .zip files can cause disk volume
28+
exhaustion <zipfile-resources-limitations>`

Doc/library/zipfile.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -886,6 +886,8 @@ Exceeding limitations on different file systems can cause decompression failed.
886886
Such as allowable characters in the directory entries, length of the file name,
887887
length of the pathname, size of a single file, and number of files, etc.
888888

889+
.. _zipfile-resources-limitations:
890+
889891
Resources limitations
890892
~~~~~~~~~~~~~~~~~~~~~
891893

0 commit comments

Comments
 (0)