Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 27 Mar 2012 12:46:48 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Vincent Danen <vdanen@...hat.com>
CC: oss-security@...ts.openwall.com,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: distutils creates ~/.pypirc insecurely

On 03/27/2012 10:19 AM, Vincent Danen wrote:
> * [2012-03-27 09:59:46 -0600] Kurt Seifried wrote:
> 
>> On 03/27/2012 08:15 AM, Vincent Danen wrote:
>>> Standard flaw where a file that contains a username and password is
>>> written with insecure permissions.  This only affects python 2.6 and
>>> higher.
>>>
>>> Could a CVE name be assigned to this flaw?  I don't think one has been
>>> already.
>>>
>>> References:
>>>
>>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
>>> https://bugzilla.redhat.com/show_bug.cgi?id=758905
>>> http://bugs.python.org/issue13512
>>> http://bugs.python.org/file23824/pypirc-secure.diff
>>>
>>> Thanks.
>>>
>>
>> Please use CVE-2012-1587 for this issue.
> 
> Sorry, I probably should have been more explicit on when it was reported
> (this is an older flaw).  It was reported (and public) in 2011.
> 

My bad, please reject CVE-2012-1587.

Please use CVE-2011-4944 for this issue, it has the correct year.

-- 
Kurt Seifried Red Hat Security Response Team (SRT)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.