Package: ion3-mod-ionflux
Version: 20050428-7
Severity: normal

When mod_ionflux is used, all child processes spawned by ion inherit
the listening UNIX socket handle. This is: 1. just wrong, and 2.
possibly a security threat (though I'm almost sure it's not).

Solution: the socket handle should be made close-on-exec with fcntl().


-- System Information:
Debian Release: testing/unstable
  APT prefers testing-proposed-updates
  APT policy: (900, 'testing-proposed-updates'), (900, 'testing'), (900, 
'stable'), (800, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)

Versions of packages ion3-mod-ionflux depends on:
ii  ion3                      20050820-3     keyboard-friendly window manager w
ii  libc6                     2.3.5-6        GNU C Library: Shared libraries an
pi  libx11-6                  6.8.2.dfsg.1-6 X Window System protocol client li
ii  libxext6                  6.8.2.dfsg.1-6 X Window System miscellaneous exte
ii  xlibs                     6.8.2.dfsg.1-6 X Window System client libraries m

ion3-mod-ionflux recommends no packages.

-- debconf-show failed


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to