| Summary: | nginx new security issue CVE-2013-0337 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Funda Wang <fundawang> |
| Status: | RESOLVED WONTFIX | QA Contact: | Sec team <security> |
| Severity: | minor | ||
| Priority: | Normal | CC: | guillomovitch, shikamaru |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/541311/ | ||
| Whiteboard: | |||
| Source RPM: | nginx-1.2.6-2.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-03-05 21:20:29 CET
David Walser
2013-03-05 21:20:49 CET
CC:
(none) =>
guillomovitch, shikamaru Deciding which file permissions are needed is highly context-dependant. That's why it does make sense to allow the end user to eventually modify then after installation if needed. But there is not much reason to enforce a specific set of permissions in the package itself. And excepted for very objectives reasons, such as mandatory presence of a password in a configuration file, I'd prefer to stick with default 644/755 default for any file or directory, for every package. Otherwise we'll quickly have a patchwork of default perms according to each maintainer sensibility... So, I don't think that change is either needed, nor even desirable in the package itself. However, defining nginx-specific file perms in msec could be eventually interesting. Thanks Guillaume. I'm marking this as WONTFIX. Status:
NEW =>
RESOLVED |