https://issues.apache.org/bugzilla/show_bug.cgi?id=50156
Mark Thomas <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX --- Comment #4 from Mark Thomas <[email protected]> 2010-10-26 08:44:50 EDT --- Malicious users shouldn't have access to the JMX interface. If they do, they can do far more damage than this. There are legitimate use cases for over-writing an existing file and whilst there are alternative solutions for those use cases I don't see any reason to tie the hands of a system administrator unnecessarily. -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
