Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150630180404.GA13944@hunt>
Date: Tue, 30 Jun 2015 11:04:04 -0700
From: Seth Arnold <seth.arnold@...onical.com>
To: oss-security@...ts.openwall.com
Subject: Re: Re: Question about world readable config files
 and commented warnings

On Tue, Jun 30, 2015 at 10:32:56AM -0600, Kurt Seifried wrote:
> Ok, so does a situation where the author creates the config file with
> that warning, and then a vendor repackages and ships it, still world
> readable, still with the warning, warrant a CVE?

Did the vendor also fill in a password? If so, that's worth a CVE to me.
If not, then it's still on the end user to decide if the hypothetical
database needs a password, and if so, if the configuration file needs to
be closed down to protect the password.

Thanks

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.