openbsd-ports/x11/windowmaker
wilfried e1c9b28667 During expansion of path, the resulting path can overflow the
supplied area of PATH_MAX+2 (buffer as well as buffer2). A tampered
environment variable can be used to modify program flow.

Way too many functions handle a return value of NULL for wexpandpath
improperly, resulting in segfaults (and maybe other problems). To
prove the existance of these issues:

The improper parsing of environment variables can lead to expansion
of path names that were not intended to be expanded.

patch from Tobias Stoeckmann
2007-04-25 11:31:53 +00:00
..
patches During expansion of path, the resulting path can overflow the 2007-04-25 11:31:53 +00:00
pkg new MULTI_PACKAGES 2006-11-21 22:07:07 +00:00
distinfo more base64 checksums 2007-04-05 17:36:18 +00:00
Makefile more WANTLIB fixes 2007-04-08 16:33:41 +00:00