Package: ion3-mod-ionflux Version: 20050428-7 Severity: normal When mod_ionflux is used, all child processes spawned by ion inherit the listening UNIX socket handle. This is: 1. just wrong, and 2. possibly a security threat (though I'm almost sure it's not).
Solution: the socket handle should be made close-on-exec with fcntl(). -- System Information: Debian Release: testing/unstable APT prefers testing-proposed-updates APT policy: (900, 'testing-proposed-updates'), (900, 'testing'), (900, 'stable'), (800, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R) Versions of packages ion3-mod-ionflux depends on: ii ion3 20050820-3 keyboard-friendly window manager w ii libc6 2.3.5-6 GNU C Library: Shared libraries an pi libx11-6 6.8.2.dfsg.1-6 X Window System protocol client li ii libxext6 6.8.2.dfsg.1-6 X Window System miscellaneous exte ii xlibs 6.8.2.dfsg.1-6 X Window System client libraries m ion3-mod-ionflux recommends no packages. -- debconf-show failed -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]