Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 27 Mar 2012 12:52:28 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: distutils creates ~/.pypirc
 insecurely

* [2012-03-27 12:46:48 -0600] Kurt Seifried wrote:

>On 03/27/2012 10:19 AM, Vincent Danen wrote:
>> * [2012-03-27 09:59:46 -0600] Kurt Seifried wrote:
>>
>>> On 03/27/2012 08:15 AM, Vincent Danen wrote:
>>>> Standard flaw where a file that contains a username and password is
>>>> written with insecure permissions.  This only affects python 2.6 and
>>>> higher.
>>>>
>>>> Could a CVE name be assigned to this flaw?  I don't think one has been
>>>> already.
>>>>
>>>> References:
>>>>
>>>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
>>>> https://bugzilla.redhat.com/show_bug.cgi?id=758905
>>>> http://bugs.python.org/issue13512
>>>> http://bugs.python.org/file23824/pypirc-secure.diff
>>>>
>>>> Thanks.
>>>>
>>>
>>> Please use CVE-2012-1587 for this issue.
>>
>> Sorry, I probably should have been more explicit on when it was reported
>> (this is an older flaw).  It was reported (and public) in 2011.
>>
>
>My bad, please reject CVE-2012-1587.
>
>Please use CVE-2011-4944 for this issue, it has the correct year.

Great, thanks, and sorry for not noting the year in the initial message.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.