From owner-freebsd-security Thu Sep 10 14:59:28 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA07873 for freebsd-security-outgoing; Thu, 10 Sep 1998 14:59:28 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from time.cdrom.com (time.cdrom.com [204.216.27.226]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA07866 for ; Thu, 10 Sep 1998 14:59:27 -0700 (PDT) (envelope-from jkh@time.cdrom.com) Received: from time.cdrom.com (jkh@localhost.cdrom.com [127.0.0.1]) by time.cdrom.com (8.8.8/8.8.8) with ESMTP id OAA18340; Thu, 10 Sep 1998 14:56:40 -0700 (PDT) (envelope-from jkh@time.cdrom.com) To: Aleph One cc: Michael Richards <026809r@dragon.acadiau.ca>, security@FreeBSD.ORG Subject: Re: cat exploit In-reply-to: Your message of "Thu, 10 Sep 1998 16:24:28 CDT." Date: Thu, 10 Sep 1998 14:56:40 -0700 Message-ID: <18336.905464600@time.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > Because its non-intuitive. How many end users are going to know that > simply cat'ing a file is dangerous? More or less shouldnt protect me. > xterm and rxvt should. Fine, submit your patches to the XFree86 Project and the author of rxvt then. This discussion passed "tedious" in the road some time back and is now heading rapidly towards idiotic status. - Jordan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message