4ddd475c7f
URL in an HTML page, HTML email or other KIO-enabled application to execute arbitrary commands on the system using the victim's account on the vulnerable machine. http://www.kde.org/info/security/advisory-20021111-1.txt
19 lines
548 B
Plaintext
19 lines
548 B
Plaintext
$OpenBSD: patch-configure_in,v 1.6 2002/11/29 05:13:37 brad Exp $
|
|
--- configure.in.orig Wed Oct 2 15:23:54 2002
|
|
+++ configure.in Sun Nov 24 04:18:55 2002
|
|
@@ -914,6 +914,14 @@ else
|
|
AC_DEFINE_UNQUOTED(__PATH_SU, "$path_su", [path to su])
|
|
fi
|
|
|
|
+dnl Check for sudo
|
|
+AC_PATH_PROG(path_sudo, "sudo", "no")
|
|
+if test "$path_sudo" = "no"; then
|
|
+ AC_MSG_WARN(sudo was not found)
|
|
+else
|
|
+ AC_DEFINE_UNQUOTED(__PATH_SUDO, "$path_sudo", [path to sudo])
|
|
+fi
|
|
+
|
|
dnl Check for POSIX.1b scheduling
|
|
AC_MSG_CHECKING([POSIX.1b scheduling])
|
|
AC_TRY_LINK([
|