From mboxrd@z Thu Jan 1 00:00:00 1970 From: zimoun Subject: bug#38422: Bug status? '.png' files with executable permissions Date: Wed, 22 Jan 2020 01:22:45 +0100 Message-ID: References: <20191129075938.GA55971@PhantoNv4ArchGx.localdomain> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Return-path: Received: from eggs.gnu.org ([2001:470:142:3::10]:34044) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1iu3oS-00083y-5A for bug-guix@gnu.org; Tue, 21 Jan 2020 19:24:05 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1iu3oP-00087i-Vu for bug-guix@gnu.org; Tue, 21 Jan 2020 19:24:04 -0500 Received: from debbugs.gnu.org ([209.51.188.43]:42720) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1iu3oP-00087b-Sx for bug-guix@gnu.org; Tue, 21 Jan 2020 19:24:01 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1iu3oP-00079v-OW for bug-guix@gnu.org; Tue, 21 Jan 2020 19:24:01 -0500 In-Reply-To: <20191129075938.GA55971@PhantoNv4ArchGx.localdomain> Sender: "Debbugs-submit" Resent-Message-ID: List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane-mx.org@gnu.org Sender: "bug-Guix" To: 38422@debbugs.gnu.org, Bengt Richter Dear Bengt, The bug report [1] points out files with unexpected permission; based on extension filename. [1] https://debbugs.gnu.org/cgi/bugreport.cgi?bug=38422 It is not an security issue or the Guix packager did not carefully check the validity of these files. If you are security paranoid, you *have to* check by yourself all the files using "guix build -S" because in paranoid mode you cannot trust Guix packagers (and Guix committers neither). In normal mode, 2 options: a- propose a patch to change the permission for each offending package b- report upstream Well, at least these 3 packages docbook-xsl, faba-icon-theme, and moka-icon-theme comes with unexpected .png file permission. On the long term, I am not convinced that adding automatic check and permission change based on filename extension would really add Quality Assurance. Because we are speaking about quality, not security. I am inclined to close this bug. What do you think? All the best, simon