components/desktop/xdg-utils/patches/0005-xdg-utils-05-CVE-2008-0386.patch
author Jay Cotton <Jay.Cotton@Oracle.COM>
Sat, 01 Oct 2016 21:55:12 -0700
changeset 7037 680031ff5b57
permissions -rw-r--r--
23245496 Move xdg-utils 1.0.2 to Userland PSARC/2010/143 GNOME 2.30

Existing set of desktop patches
When we update to a version from upstream that has this fix, this
can be dropped

--- xdg-utils-1.0.2/scripts/xdg-email.orig	2013-09-16 16:47:36.187915000 +0530
+++ xdg-utils-1.0.2/scripts/xdg-email	2013-09-16 16:49:52.658651000 +0530
@@ -438,8 +438,8 @@ open_generic()
     for browser in $BROWSER; do
         if [ x"$browser" != x"" ]; then
 
-            browser_with_arg=`echo "$browser" | sed s#%s#"$1"#`
-
+            IFS=' '
+            browser_with_arg=${browser//'%s'/"$1"}
             if [ x"$browser_with_arg" = x"$browser" ]; then "$browser" "$1";
             else $browser_with_arg;
             fi
--- xdg-utils-1.0.2/scripts/xdg-open.orig	2013-09-16 16:50:17.667487000 +0530
+++ xdg-utils-1.0.2/scripts/xdg-open	2013-09-16 16:51:03.313433000 +0530
@@ -367,8 +367,8 @@ open_generic()
     for browser in $BROWSER; do
         if [ x"$browser" != x"" ]; then
 
-            browser_with_arg=`echo "$browser" | sed s#%s#"$1"#`
-
+            IFS=' '
+            browser_with_arg=${browser//'%s'/"$1"}
             if [ x"$browser_with_arg" = x"$browser" ]; then "$browser" "$1";
             else $browser_with_arg;
             fi