When GV detects that the document is either a PDF file or a
GZip compressed file, it executes some commands with the help of the
system() function. Unfortunately, these commands contain the
filename, which can be considered as untrusted user input. It is then
possible to distribute a file (with a meticulously chosen filename,
that even seems innocent) that causes execution of arbitrary
shell commands when it is read with GV.
http://www.epita.fr/~bevand_m/asa/asa-0000
port.
- why bother creating a man page if we don't install it ?
- our echo does handle \n, so it needs to be protected.
- for that matter, yield a sensible list of directories for OpenBSD.
- INSTALL script that predates dependencies...
And:
- prepare for gs 7.00, detect the version of ghostscript installed,
and tweak resource files to use x11 device with aa options instead
of the older x11alpha. Mark resource files as no checksum accordingly.