Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 4177 - samba install leads to loss of read permission /etc/services
samba install leads to loss of read permission /etc/services
Product: Red Hat Linux
Classification: Retired
Component: samba (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Trond Eivind Glomsrxd
: 4257 (view as bug list)
Depends On:
  Show dependency treegraph
Reported: 1999-07-23 10:44 EDT by ae
Modified: 2008-05-01 11:37 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 1999-07-23 11:10:49 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description ae 1999-07-23 10:44:54 EDT
if root's umask os 066, then
rpm -Uvh 2.0.5a-1.i386.rpm leads to no group, other
read permission on /etc/services, /etc/inetd.conf.

In the first case, this breaks (at least) Powell's LPRng,
and one supposes will cause trouble in general.
See the 'mv' lines in the postuninstall script.

In the second case, no trouble identified but it seems
Comment 1 Bill Nottingham 1999-07-23 10:59:59 EDT
fixed in samba-2.0.5a-2, which will be in next Raw Hide release.
Comment 2 Bill Nottingham 1999-07-23 11:10:59 EDT
Unfortunately, since the problem is in the %postun of the
*previous* version, you might still have to chmod them back
Comment 3 Bill Nottingham 1999-07-29 17:35:59 EDT
*** Bug 4257 has been marked as a duplicate of this bug. ***

I installed the upgrade rpm and it changed permissions on
/etc/services from rw-r-r to rw--.  As a result, outgoing
telnet and ftp broke.

I've done this on 2 separate RH6.0 machines, and on the
second I observed that the samba rpm actually did cause the
problem (before and after comparison)

Note You need to log in before you can comment on or make changes to this bug.