On 12/03/13 13:57, Michael Lustfield wrote:
> precautionary - That would mean we assume that making the change won't
> break anything. We're setting this for new installs but forcing it on
> already deployed systems wouldn't be a good idea. We could add a NEWS
> entry to recommend making this change. It's definitely not a good idea
> to force it to happen.

I think there is a duty to fix it on upgrade, otherwise having <fixed
version> installed will not be an indication that the system is patched
for CVE-2013-0337.

Of course if owner/group/permissions were changed in any way since the
older nginx package version was installed, I would leave them alone.

Otherwise, if removing world read/execute permissions, changing the
owner/group to www-data:adm eliminates most risk of anything breaking.
The only problem I foresee is the last (unlikely, and inherently secure)
example I gave in [#44], where world readable logs are assumed.  That
could be so easily fixed by adding appropriate users into the adm group,
or overriding owner/group/permissions of /var/log/nginx afterward.

[#44]: http://bugs.debian.org/701112#44

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to