I updated task spooler to 0.7.1, which does the ownership check in case the user
did not supply a TS_SOCKET env var.
http://vicerveza.homeunix.net/~viric/soft/ts/ts-0.7.1.tar.gz
I think this fixes the security thread.
Regards,
Lluís
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.
On Sat, Sep 03, 2011 at 12:07:59PM +0200, Ansgar Burchardt wrote:
> David Bremner writes:
> You can have a symlink to a socket somewhere else which can then have a
> random name. In case the real socket is in a world-writable directory,
> you also need to check that it is still your socket and wa
I confirm I see the same bug in dietlibc 0.32.
gcc 4.3.4
compiling native in armv5tel-linux-gnueabi, kernel headers from 2.6.28
This happens not only in debian.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@li
3 matches
Mail list logo