Bug 201640
Summary: | zip creates files with too-strict permissions | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | cody sparks <cody_sparks> |
Component: | zip | Assignee: | Ivana Varekova <varekova> |
Status: | CLOSED DUPLICATE | QA Contact: | Ben Levenson <benl> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.0 | CC: | varekova |
Target Milestone: | --- | Keywords: | Reopened |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2006-10-11 08:56:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
cody sparks
2006-08-07 21:20:43 UTC
Hello, this restriction was included with patch. It was made for safer behaviour. Patch was made for bug #112516. So I close it like a notabug. These bug reports are unrelated. The problem reported in bug #112516 is due to insecure *temporary* files. The file that I am speaking of is the new zip file created. I understand the need for temporary files to be secure, but shouldn't my newly-created zip files follow my environmentally-set umask, as all other newly-created files do? In the previous bug report, the *temporary* files were world-readable (mode 644), and apparently the submitter wanted these temporary files to be mode 600. What I was expecting with this case is the newly-created zip files that a user creates will be created with the permissions specified in that user's umask environment variable. |