head 1.4; access; symbols pkgsrc-2013Q2:1.4.0.20 pkgsrc-2013Q2-base:1.4 pkgsrc-2012Q4:1.4.0.18 pkgsrc-2012Q4-base:1.4 pkgsrc-2011Q4:1.4.0.16 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q2:1.4.0.14 pkgsrc-2011Q2-base:1.4 pkgsrc-2009Q4:1.4.0.12 pkgsrc-2009Q4-base:1.4 pkgsrc-2008Q4:1.4.0.10 pkgsrc-2008Q4-base:1.4 pkgsrc-2008Q3:1.4.0.8 pkgsrc-2008Q3-base:1.4 cube-native-xorg:1.4.0.6 cube-native-xorg-base:1.4 pkgsrc-2008Q2:1.4.0.4 pkgsrc-2008Q2-base:1.4 pkgsrc-2008Q1:1.4.0.2 pkgsrc-2008Q1-base:1.4 pkgsrc-2007Q4:1.3.0.4 pkgsrc-2007Q4-base:1.3 pkgsrc-2007Q3:1.3.0.2 pkgsrc-2007Q3-base:1.3 pkgsrc-2007Q2:1.2.0.16 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.14 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.2.0.12 pkgsrc-2006Q4-base:1.2 pkgsrc-2006Q3:1.2.0.10 pkgsrc-2006Q3-base:1.2 pkgsrc-2006Q2:1.2.0.8 pkgsrc-2006Q2-base:1.2 pkgsrc-2006Q1:1.2.0.6 pkgsrc-2006Q1-base:1.2 pkgsrc-2005Q4:1.2.0.4 pkgsrc-2005Q4-base:1.2 pkgsrc-2005Q3:1.2.0.2 pkgsrc-2005Q3-base:1.2; locks; strict; comment @# @; 1.4 date 2008.04.01.01.39.24; author taca; state dead; branches; next 1.3; 1.3 date 2007.08.10.17.14.40; author drochner; state Exp; branches; next 1.2; 1.2 date 2005.09.19.16.13.26; author drochner; state dead; branches; next 1.1; 1.1 date 2005.08.30.12.47.52; author drochner; state Exp; branches; next ; desc @@ 1.4 log @Update nss_ldap package to 260 based on PR pkg/38346 from Taku YASUI. This update includes security fix for CVE-2007-5794. Changes from 240 is too much to list here. See ChangeLog, please. @ text @$NetBSD: patch-ah,v 1.3 2007/08/10 17:14:40 drochner Exp $ --- ldap-pwd.c.orig 2007-08-09 19:20:45.000000000 +0200 +++ ldap-pwd.c @@@@ -185,7 +185,7 @@@@ _nss_ldap_parse_pw (LDAPMessage * e, _nss_ldap_assign_attrval (e, AT (shadowLastChange), &tmp, &buffer, &buflen); if (stat == NSS_SUCCESS) - pw->pw_change += atol(tmp); + pw->pw_change += atol(tmp) * (24*60*60); else pw->pw_change = 0; } @ 1.3 log @correctly use shadowLastChange as _days_ since the epoch, from Edgar Fuss per PR pkg/36625 @ text @d1 1 a1 1 $NetBSD$ @ 1.2 log @update to rev. 240, fixes a potential information disclosure when TLS and referrals are used together (http://secunia.com/advisories/15906/) mostly from Adrian Portelli, tested by me (The most recent version 242 kills the system completely if the LDAP server is not running -- endless connection retries.) @ text @d1 1 a1 1 $NetBSD: patch-ah,v 1.1 2005/08/30 12:47:52 drochner Exp $ d3 10 a12 3 --- ldap-grp.c.orig 2005-08-30 13:51:39.000000000 +0200 +++ ldap-grp.c @@@@ -1115,6 +1115,8 @@@@ char *_nss_ldap_getgrset (char *user) a13 7 #else filter = _nss_ldap_filt_getgroupsbymember; + gidnumber_attrs[0] = ATM (group, gidNumber); + gidnumber_attrs[1] = NULL; #endif /* RFC2307BIS */ stat = _nss_ldap_getent_ex (&a, &ctx, (void *) &lia, NULL, 0, @ 1.1 log @-cleanup: honor PKG_SYSCONFDIR, use USE_PKGINSTALL -support the "getgroupmembership" nsswitch invocation bump PKGREVISION @ text @d1 1 a1 1 $NetBSD$ @