Your message dated Fri, 23 May 2014 16:54:06 +0000
with message-id <[email protected]>
has caused the   report #741441,
regarding gnustep-base-runtime: gdomap does chroot("/tmp")
to be marked as having been forwarded to the upstream software
author(s) 

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
741441: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741441
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
URL:
  <http://savannah.gnu.org/bugs/?42411>

                 Summary: gdomap chroots to /tmp
                 Project: GNUstep
            Submitted by: yavor
            Submitted on: Fri 23 May 2014 07:54:06 PM EEST
                Category: Base/Foundation
                Severity: 3 - Normal
              Item Group: Bug
                  Status: None
                 Privacy: Public
             Assigned to: None
             Open/Closed: Open
         Discussion Lock: Any

    _______________________________________________________

Details:

Another report from Debian, original URL:
http://bugs.debian.org/741441

"gdomap chroots to /tmp "as another level of paranoia". However if you are
paranoid, you really want to chroot to an empty, non-writable directory, not
to a world-writable one containing random files."




    _______________________________________________________

Reply to this item at:

  <http://savannah.gnu.org/bugs/?42411>

_______________________________________________
  Message sent via/by Savannah
  http://savannah.gnu.org/

--- End Message ---

Reply via email to