Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jan 2000 00:55:54 -0800 (PST)
From:      Kris Kennaway <kris@hub.freebsd.org>
To:        Masafumi NAKANE <max@wide.ad.jp>
Cc:        serg@dor.zaural.ru, freebsd-security@FreeBSD.org, freebsd-bugs@FreeBSD.org
Subject:   Re: delegate buffer overflow (ports)
Message-ID:  <Pine.BSF.4.21.0001280053120.27989-100000@hub.freebsd.org>
In-Reply-To: <877lgufvc3.wl@fr.aslm.rim.or.jp>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Jan 2000, Masafumi NAKANE wrote:

> Instead, I will make this port to ask the user if he/she really wants
> to continue the installation with the security information at
> ``pkg_add'', ``make pre-fetch'' and ``make install'' times.  This

Hmm. If this is along the lines of:

**************************************
** WARNING!!! WARNING!!! WARNING!!! **
**************************************

THIS PORT CONTAINS KNOWN SECURITY HOLES WHICH ALLOW A REMOTE ATTACKER TO
EASILY TAKE CONTROL OF YOUR MACHINE. YOU INSTALL THIS PORT AT YOUR OWN
RISK!! DON'T COME CRYING TO US IF YOU GET ROOTED BECAUSE OF INSTALLING
THIS PORT.

Do you want hackers to be able to take remote control of your
machine? (y/N):

then I guess I have no problem with it :-)

Kris

----
"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0001280053120.27989-100000>