added http://www.heily.com/mark/code_samples/appicon_captions_maxprotect.diff
patch:
Buffer overflow in WindowMaker may allow remote attackers to execute arbitrary
code via a certain image file that is not properly handled when Window Maker
uses width and height information to allocate a buffer.
Changed files:
WindowMaker.spec -> 1.109
Summary(uk): WindowMaker - צËÏÎÎÉÊ ÍÅÎÅÄÖÅÒ ÄÌÑ X11
Name: WindowMaker
Version: 0.80.2
-Release: 3
+Release: 4
License: GPL
Group: X11/Window Managers
Source0: ftp://ftp.windowmaker.org/pub/source/release/%{name}-%{version}.tar.bz2
Patch10: %{name}-rxvt.patch
Patch11: %{name}-pl.po-update.patch
Patch12: %{name}-wmchlocale-fixes.patch
+Patch13: http://www.heily.com/mark/code_samples/appicon_captions_maxprotect.diff
URL: http://www.windowmaker.org/
BuildRequires: autoconf
BuildRequires: automake
%patch10 -p1
%patch11 -p1
%patch12 -p1
+%patch13 -p1
for f in WindowMaker/*menu*; do
sed s,/usr/local/GNUstep/,/usr/X11R6/lib/GNUstep/, $f >$f.new