Add a security warning about the many local buffer overflows in this
software, qualified by the fact that it's setgid games and therefore not dangerous to the system. Many of these buffer overflows aren't classic smashed stacks, but I bet at least one is exploitable :-)
This commit is contained in:
parent
938877754b
commit
b0e70f9c89
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=37709
@ -7,6 +7,7 @@
|
||||
|
||||
PORTNAME= dopewars
|
||||
PORTVERSION= 1.4.8
|
||||
PORTREVISION= 1
|
||||
CATEGORIES= games
|
||||
MASTER_SITES= http://bellatrix.pcl.ox.ac.uk/~ben/dopewars/
|
||||
|
||||
@ -15,6 +16,11 @@ MAINTAINER= jim@FreeBSD.org
|
||||
USE_GMAKE= yes
|
||||
GNU_CONFIGURE= yes
|
||||
|
||||
pre-fetch:
|
||||
.if !defined(BATCH) && !defined(PACKAGE_BUILDING)
|
||||
${SH} pkg-install
|
||||
.endif
|
||||
|
||||
post-install:
|
||||
@${ECHO} "===> Documentation is installed in ${PREFIX}/share/doc/dopewars"
|
||||
@${ECHO} "===> Run 'dopewars -h' for usage options."
|
||||
|
9
games/dopewars/pkg-install
Normal file
9
games/dopewars/pkg-install
Normal file
@ -0,0 +1,9 @@
|
||||
#!/bin/sh
|
||||
|
||||
if [ "$2" = "POST-INSTALL" -o -n "${PACKAGE_BUILDING}" ]; then
|
||||
exit 0
|
||||
fi
|
||||
|
||||
/usr/bin/dialog --yesno "SECURITY NOTE: This software contains known locally-exploitable buffer overflows. However since the binaries in question are setgid to the games group, the impact of this vulnerability is believed to be limited to the ability for local users to overwrite score files, saved games, and certain other game data for this and other installed game packages. The wider system security is not believed to be compromised by this problem. Do you wish to install the software anyway?" 12 70 || /usr/bin/false
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user