openbsd-ports/x11/kde/libs3/patches/patch-configure_in
brad 4ddd475c7f Fix a vulnerability which would potentially allow a carefully crafted
URL in an HTML page, HTML email or other KIO-enabled application to
execute arbitrary commands on the system using the victim's account on
the vulnerable machine.

http://www.kde.org/info/security/advisory-20021111-1.txt
2002-11-29 05:13:37 +00:00

19 lines
548 B
Plaintext

$OpenBSD: patch-configure_in,v 1.6 2002/11/29 05:13:37 brad Exp $
--- configure.in.orig Wed Oct 2 15:23:54 2002
+++ configure.in Sun Nov 24 04:18:55 2002
@@ -914,6 +914,14 @@ else
AC_DEFINE_UNQUOTED(__PATH_SU, "$path_su", [path to su])
fi
+dnl Check for sudo
+AC_PATH_PROG(path_sudo, "sudo", "no")
+if test "$path_sudo" = "no"; then
+ AC_MSG_WARN(sudo was not found)
+else
+ AC_DEFINE_UNQUOTED(__PATH_SUDO, "$path_sudo", [path to sudo])
+fi
+
dnl Check for POSIX.1b scheduling
AC_MSG_CHECKING([POSIX.1b scheduling])
AC_TRY_LINK([