[Bug 562469] Review Request: openvas-scanner - Open Vulnerability Assessment (OpenVAS) Scanner

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.


https://bugzilla.redhat.com/show_bug.cgi?id=562469

--- Comment #30 from Xavier Bachelot <xavier@xxxxxxxxxxxx> 2010-04-14 14:50:21 EDT ---
(In reply to comment #28)
> Hello,
> I have tried with ( the current) perrmissions 644 and it works.
> I was testing openvas_
> Libraries are apparently explicitly loaded and not linked to executable - so
> they do not need executable bit. 
> 
> In my opinion permissions can stay as they are.
> 
The provides should probably be filtered out then : 

$ rpm -qp --provides openvas-scanner-3.0.2-1.fc14.i686.rpm
config(openvas-scanner) = 3.0.2-1.fc14
libfind_service.so.0  
libopenvas_tcp_scanner.so.0  
libssl_ciphers.so.0  
libsynscan.so.0  
openvas-scanner = 3.0.2-1.fc14
openvas-scanner(x86-32) = 3.0.2-1.fc14

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
_______________________________________________
package-review mailing list
package-review@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/package-review

[Index of Archives]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]