Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120327161917.GL1398@redhat.com>
Date: Tue, 27 Mar 2012 10:19:17 -0600
From: Vincent Danen <vdanen@...hat.com>
To: Kurt Seifried <kseifried@...hat.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE request: distutils creates ~/.pypirc
 insecurely

* [2012-03-27 09:59:46 -0600] Kurt Seifried wrote:

>On 03/27/2012 08:15 AM, Vincent Danen wrote:
>> Standard flaw where a file that contains a username and password is
>> written with insecure permissions.  This only affects python 2.6 and
>> higher.
>>
>> Could a CVE name be assigned to this flaw?  I don't think one has been
>> already.
>>
>> References:
>>
>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
>> https://bugzilla.redhat.com/show_bug.cgi?id=758905
>> http://bugs.python.org/issue13512
>> http://bugs.python.org/file23824/pypirc-secure.diff
>>
>> Thanks.
>>
>
>Please use CVE-2012-1587 for this issue.

Sorry, I probably should have been more explicit on when it was reported
(this is an older flaw).  It was reported (and public) in 2011.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.