From owner-svn-ports-head@freebsd.org Sat Jun 15 18:42:28 2019 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9D51C15CD2D4; Sat, 15 Jun 2019 18:42:28 +0000 (UTC) (envelope-from danfe@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3D5AF86CEE; Sat, 15 Jun 2019 18:42:28 +0000 (UTC) (envelope-from danfe@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1033) id 09653C6C5; Sat, 15 Jun 2019 18:42:28 +0000 (UTC) Date: Sat, 15 Jun 2019 18:42:28 +0000 From: Alexey Dokuchaev To: Adam Weinberger Cc: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: Re: svn commit: r504132 - head/security/vuxml Message-ID: <20190615184227.GA14704@FreeBSD.org> References: <201906131841.x5DIfuSb069885@repo.freebsd.org> <20190615151247.GA24087@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.4 (2019-03-13) X-Rspamd-Queue-Id: 3D5AF86CEE X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.95 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.95)[-0.953,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 15 Jun 2019 18:42:28 -0000 On Sat, Jun 15, 2019 at 09:41:24AM -0600, Adam Weinberger wrote: > On Sat, Jun 15, 2019 at 9:12 AM Alexey Dokuchaev wrote: > > ... > > I've seen people say that in some distributions, default packages > > were not affected because their maintainers deliberately disable > > modelines, e.g. in Debian [and Gentoo] > > Their default packages ARE affected. If your car explodes in 6th gear, > you can't say your car isn't affected because it starts up in first. > Whether they're enabled or disabled by default, the package is still > vulnerable. Adam, sorry, I shouldn't have said that their packages aren't affected. Apparently I didn't make myself clear enough, let me try again: Do we package Vim/NeoVim with modelines enabled by default? I think it's generally a good idea to turn potentially dangerous features, esp. with an earlier history of security/resource vulnerabilities, off by default -- it does not make packages less vulnerable, but leaves one extra potential attack door closed rather than opened. ./danfe