Secunia Advisory reports:
A vulnerability has been reported in rPath rMake, which can be exploited by malicious, local users to cause a Denial of Service (DoS) or potentially to gain escalated privileges.
The vulnerability is caused due to the rMake build tool incorrectly creating the device name "/dev/zero" with the device numbers of the "/dev/port" device. This can be exploited to gain read-write access to "/dev/port".
The vulnerability is reported in version 1.0.11. Prior versions may also be affected.
Update to:
rmake=/conary.rpath.com@rpl:devel//1/1.0.11.1-2-0.1
rmake-proxy=/conary.rpath.com@rpl:devel//1/1.0.11.1-2-0.1
rmake-repos=/conary.rpath.com@rpl:devel//1/1.0.11.1-2-0.1
You can check it out from Secunia, here.