Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Jan 2003 13:29:04 +0100
From:      Mark <admin@asarian-host.net>
To:        "Mike Makonnen" <mtm@identd.net>
Cc:        <dwmalone@maths.tcd.ie>, <freebsd-bugs@freebsd.org>
Subject:   Re: bin/46838: security vulnerability in dump
Message-ID:  <200301081229.H08CTAJ31351@asarian-host.net>
References:  <200301072050.h07Ko4Kj025064@asarian-host.net> <20030108050541.PSPE4558.pop018.verizon.net@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help

I can live with that. :) The man-page takes adequately care of it.

Thank you for your time and having taken this into consideration.

- Mark

        System Administrator Asarian-host.org

---
"If you were supposed to understand it,
we wouldn't call it code." - FedEx


----- Original Message ----- 
From: "Mike Makonnen" <mtm@identd.net>
To: "Mark" <admin@asarian-host.net>
Cc: <dwmalone@maths.tcd.ie>; <freebsd-bugs@FreeBSD.ORG>
Sent: Wednesday, January 08, 2003 6:05 AM
Subject: Re: bin/46838: security vulnerability in dump


> I have to agree with David here. Dump should not hard code any file
> creation modes. We have no way of anticipating (or the right to dictate)
> how an administrator should run his system. However, it probably
> deserves a mention in the man page. Does the following patch address
> your concerns?
> 
> Cheers.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200301081229.H08CTAJ31351>