Ádám Szilveszter <adamsz_at_mailpont.hu> writes: > You know, there are much bigger problems than that. For example the fact, > that any vulnerability in fetch(1) or libfetch(3) is a remote root > compromise candidate on FreeBSD, because the Ports system still insists on > running it as root by default downloading distfiles from unchecked amd > potentially unsecure servers all over the Internet. Wrong. If you go into a ports directory and type 'make install clean' as an unprivileged user, the only parts of the build that actually run with root privileges are the final portions of the installation sequence. DES -- Dag-Erling Smørgrav - des_at_des.noReceived on Fri Dec 30 2005 - 08:11:25 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:49 UTC