|
Message-Id: <201405201711.s4KHB6ba020001@linus.mitre.org> Date: Tue, 20 May 2014 13:11:06 -0400 (EDT) From: cve-assign@...re.org To: jmm@...ian.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: xbmc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747428 > http://trac.xbmc.org/ticket/15198 Use CVE-2014-3800 for the issue in which mode 0644 can be used for a file containing a password. There is no CVE ID for "users should be informed that the password will be stored in a unsafe manner." Otherwise we would probably need CVE IDs for ftp clients that obtain passwords from mode-0600 .netrc files without warning the user that .netrc has cleartext data. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTe4wuAAoJEKllVAevmvmsoHIH/Rv3aMK8X7EGqaalf+R368Ng +MHGi7pDxOV7iimlrRYLl3bRLPvHy/Zb/Bg2LDGRo6XrcdpkYlaN9HtCJK1UH/mu WuBIpi+qIvqtIZ3V4T3yrqWngQBC1PdsZEpgDzTybKoaFYpzMJQFrm4KkQMzspsx dBRH0URZHo4OM2Pgnl6GXCpjN5sg6hjVJF8bFfkElJLoNuZkBNtIN5GkmJsn8ONx A9CpChXEihFhsfINrfkgSyjbgnRwfDZh1ZgqnAK3Kod42wAYNl09kcQwKjOFJoQq nwsXMpnDyUfhlj9ZpiLNLWzAYLNfOS5psEp58Q3OnV7F74uY2GGyIwxL1YCEW18= =QK1V -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.