Your message dated Fri, 23 May 2014 16:54:06 +0000 with message-id <[email protected]> has caused the report #741441, regarding gnustep-base-runtime: gdomap does chroot("/tmp") to be marked as having been forwarded to the upstream software author(s)
(NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 741441: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741441 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---URL: <http://savannah.gnu.org/bugs/?42411> Summary: gdomap chroots to /tmp Project: GNUstep Submitted by: yavor Submitted on: Fri 23 May 2014 07:54:06 PM EEST Category: Base/Foundation Severity: 3 - Normal Item Group: Bug Status: None Privacy: Public Assigned to: None Open/Closed: Open Discussion Lock: Any _______________________________________________________ Details: Another report from Debian, original URL: http://bugs.debian.org/741441 "gdomap chroots to /tmp "as another level of paranoia". However if you are paranoid, you really want to chroot to an empty, non-writable directory, not to a world-writable one containing random files." _______________________________________________________ Reply to this item at: <http://savannah.gnu.org/bugs/?42411> _______________________________________________ Message sent via/by Savannah http://savannah.gnu.org/
--- End Message ---

