Date: Fri, 28 Jan 2000 00:55:54 -0800 (PST) From: Kris Kennaway <kris@hub.freebsd.org> To: Masafumi NAKANE <max@wide.ad.jp> Cc: serg@dor.zaural.ru, freebsd-security@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: delegate buffer overflow (ports) Message-ID: <Pine.BSF.4.21.0001280053120.27989-100000@hub.freebsd.org> In-Reply-To: <877lgufvc3.wl@fr.aslm.rim.or.jp>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Jan 2000, Masafumi NAKANE wrote: > Instead, I will make this port to ask the user if he/she really wants > to continue the installation with the security information at > ``pkg_add'', ``make pre-fetch'' and ``make install'' times. This Hmm. If this is along the lines of: ************************************** ** WARNING!!! WARNING!!! WARNING!!! ** ************************************** THIS PORT CONTAINS KNOWN SECURITY HOLES WHICH ALLOW A REMOTE ATTACKER TO EASILY TAKE CONTROL OF YOUR MACHINE. YOU INSTALL THIS PORT AT YOUR OWN RISK!! DON'T COME CRYING TO US IF YOU GET ROOTED BECAUSE OF INSTALLING THIS PORT. Do you want hackers to be able to take remote control of your machine? (y/N): then I guess I have no problem with it :-) Kris ---- "How many roads must a man walk down, before you call him a man?" "Eight!" "That was a rhetorical question!" "Oh..then, seven!" -- Homer Simpson To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0001280053120.27989-100000>