Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201405201711.s4KHB6ba020001@linus.mitre.org>
Date: Tue, 20 May 2014 13:11:06 -0400 (EDT)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: xbmc

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747428
> http://trac.xbmc.org/ticket/15198

Use CVE-2014-3800 for the issue in which mode 0644 can be used for a
file containing a password. There is no CVE ID for "users should be
informed that the password will be stored in a unsafe manner."
Otherwise we would probably need CVE IDs for ftp clients that obtain
passwords from mode-0600 .netrc files without warning the user
that .netrc has cleartext data.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTe4wuAAoJEKllVAevmvmsoHIH/Rv3aMK8X7EGqaalf+R368Ng
+MHGi7pDxOV7iimlrRYLl3bRLPvHy/Zb/Bg2LDGRo6XrcdpkYlaN9HtCJK1UH/mu
WuBIpi+qIvqtIZ3V4T3yrqWngQBC1PdsZEpgDzTybKoaFYpzMJQFrm4KkQMzspsx
dBRH0URZHo4OM2Pgnl6GXCpjN5sg6hjVJF8bFfkElJLoNuZkBNtIN5GkmJsn8ONx
A9CpChXEihFhsfINrfkgSyjbgnRwfDZh1ZgqnAK3Kod42wAYNl09kcQwKjOFJoQq
nwsXMpnDyUfhlj9ZpiLNLWzAYLNfOS5psEp58Q3OnV7F74uY2GGyIwxL1YCEW18=
=QK1V
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.