Yeah, netcat, hehe. emerge -pv netcat ... [ebuild N ] net-analyzer/netcat [110-r8] -GAPING_SECURITY_HOLE +crypt -ipv6 -static 107 kB
I would be interested in a USE flag for this glibc patch. On 7/31/05, Ben Skeggs <[EMAIL PROTECTED]> wrote: > Duncan wrote: > > >Brian Hall posted <[EMAIL PROTECTED]>, excerpted > >below, on Sun, 31 Jul 2005 08:56:00 -0600: > > > > > > > >>Perhaps a USE flag could be created to enable the glibc patches, then a > >>emerge --newuse could recompile glibc and the problem apps (or > >>everything); maybe a mini-howto document would also be helpful. > >> > >>I would certainly like an easy way to enable any "free" performance > >>boost I can get! > >> > >> > > > >Something like USE=dangerous-amd64-hack? <g> > > > >(Seriously, there at least used to be a local use flag > >USE=frickin-big-security-hole, or some such, on some app I can't remember > >at the moment. Turns out a teacher was using that app in his class as a > >an example or something, so the dev left the ability to create it there, > >but with a USE flag nobody in their right mind would normally enable. I > >wish I could remember what it was, but grepping use.local.desc for > >anything that might be related doesn't seem to bring it up. Perhaps the > >app, or anyway the USE flag, has now been removed from portage?) > > > >The use.local.desc description could point to the bug, which is IIRC what > >the one above did, for those wanting more information about just why such > >a USE flag exists, and just why someone might be persuaded to enable it. > > > > > > > Are you talking about GAPING_SECURITY_HOLE? If so, this flag is still > in use by the net-analyzer/netcat package. It enables the "-E" (iirc) > switch > which allows you to do something like: > nc -l -p 12345 -E /bin/bash > > This(or something close to it) would cause netcat to listen on port 12345, > and forward the person who connects to it a nice bash shell. > > Ben. > -- > [email protected] mailing list > > -- [email protected] mailing list
