Date: Mon, 14 Nov 2005 01:14:20 +0800 From: Xin LI <delphij@gmail.com> To: Kris Kennaway <kris@obsecurity.org> Cc: Sam Lawrance <samuel.lawrance@studentmail.newcastle.edu.au>, cvs-ports@freebsd.org, Colin Percival <cperciva@freebsd.org>, cvs-all@freebsd.org, ports-committers@freebsd.org Subject: Re: cvs commit: ports/misc/bsdiff Makefile ports/sysutils/portsnap Makefile Message-ID: <a78074950511130914v578fff20y80d01b0b3a4a3cdb@mail.gmail.com> In-Reply-To: <20051113084705.GA72140@xor.obsecurity.org> References: <200511130813.jAD8DGM8015779@repoman.freebsd.org> <0811F41A-1DC9-4DA8-8213-8DD02B185FE9@studentmail.newcastle.edu.au> <20051113084705.GA72140@xor.obsecurity.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, Kris, On 11/13/05, Kris Kennaway <kris@obsecurity.org> wrote: [snip] > run 5.4 for a long time. I don't think this would matter anyway, > since OSVERSION is spoofed for package builds. I am a bit curious about how did this happen. Is there some code available for this? Currently I have a set of hacked uname(1) and sysctl(1) to get the result, but seems that some certain programs obtain the OSVERSION through sysctl(2) which would be a bit tricky to spoof... Any hints? Cheers, -- Xin LI <delphij@delphij.net> http://www.delphij.net
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a78074950511130914v578fff20y80d01b0b3a4a3cdb>
