diff options
author | Kris Kennaway <kris@FreeBSD.org> | 2000-10-30 01:35:21 +0000 |
---|---|---|
committer | Kris Kennaway <kris@FreeBSD.org> | 2000-10-30 01:35:21 +0000 |
commit | ca5f083e1f70b982ecaef2161a9a02bc5f18ccfc (patch) | |
tree | 691ebc47adb0020eb41952d759a76abcf62c94f0 /mail/pine4-ssl | |
parent | 7468059a5d21a855fa074cc0afd7a28fcf2a7c36 (diff) | |
download | freebsd-ports-ca5f083e1f70b982ecaef2161a9a02bc5f18ccfc.zip |
Add a patch to address the known remote buffer overflow, from
Mike Silbersack <silby@silby.com>. Add a build- and install-time
warning about the probable existence of further remote security
problems, and remove FORBIDDEN.
Submitted by: Mike Silbersack <silby@silby.com>
Diffstat (limited to 'mail/pine4-ssl')
-rw-r--r-- | mail/pine4-ssl/pkg-install | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/mail/pine4-ssl/pkg-install b/mail/pine4-ssl/pkg-install new file mode 100644 index 000000000000..b8e5db1ea6ee --- /dev/null +++ b/mail/pine4-ssl/pkg-install @@ -0,0 +1,9 @@ +#!/bin/sh + +if [ "$2" = "POST-INSTALL" -o -n "${PACKAGE_BUILDING}" ]; then + exit 0 +fi + +/usr/bin/dialog --yesno "SECURITY NOTE: The pine software has had several remote vulnerabilities discovered in the past, which allowed remote attackers to execute arbitrary code as you on your local system, by the action of sending a specially-prepared email. All such KNOWN problems have been fixed, but the pine code is written in a very insecure style and the FreeBSD Security Officer believes there are likely to be other undiscovered vulnerabilities. Do you wish to proceed with the installation of pine anyway?" 12 70 || /usr/bin/false + + |