From 53352284af7d77f2e96c93757dca5f9e5881269e Mon Sep 17 00:00:00 2001 From: jmmv Date: Mon, 1 May 2006 19:56:04 +0000 Subject: Properly drop egid to that of the user logging in. Otherwise, the started session has more privileges than it should and GTK applications simply refuse to start. I do not know how this slipped in the release... maybe some libc function behaves differently in Linux. Will report this upstream later. Bump PKGREVISION to 1. --- x11/gdm/Makefile | 3 ++- x11/gdm/distinfo | 3 ++- x11/gdm/patches/patch-ab | 12 ++++++++++++ 3 files changed, 16 insertions(+), 2 deletions(-) create mode 100644 x11/gdm/patches/patch-ab (limited to 'x11/gdm') diff --git a/x11/gdm/Makefile b/x11/gdm/Makefile index f9b6343ce7e..ba4dc14045a 100644 --- a/x11/gdm/Makefile +++ b/x11/gdm/Makefile @@ -1,7 +1,8 @@ -# $NetBSD: Makefile,v 1.111 2006/05/01 10:01:52 jmmv Exp $ +# $NetBSD: Makefile,v 1.112 2006/05/01 19:56:04 jmmv Exp $ # DISTNAME= gdm-2.14.4 +PKGREVISION= 1 CATEGORIES= x11 gnome MASTER_SITES= ${MASTER_SITE_GNOME:=sources/gdm/2.14/} EXTRACT_SUFX= .tar.bz2 diff --git a/x11/gdm/distinfo b/x11/gdm/distinfo index 73c0122bd03..42a7d806bfb 100644 --- a/x11/gdm/distinfo +++ b/x11/gdm/distinfo @@ -1,8 +1,9 @@ -$NetBSD: distinfo,v 1.36 2006/05/01 10:01:52 jmmv Exp $ +$NetBSD: distinfo,v 1.37 2006/05/01 19:56:04 jmmv Exp $ SHA1 (gdm-2.14.4.tar.bz2) = fa955613545d1a966ece8d0953118dfe92d80a9b RMD160 (gdm-2.14.4.tar.bz2) = 9b2957a9128fd82074eb3a2de8d654e725020d9c Size (gdm-2.14.4.tar.bz2) = 3041769 bytes SHA1 (patch-aa) = 2b7112cd5670f99b261765f47a6b70b73c0f42a0 +SHA1 (patch-ab) = ba02d32d69af65d2763a67ab547eaaa8c736e5a2 SHA1 (patch-ae) = 87f26d19ec42eacef853df1b0cf680dae102d3fd SHA1 (patch-ak) = e3eaf2dfa1e393f9808d22fe4384710a46a83afc diff --git a/x11/gdm/patches/patch-ab b/x11/gdm/patches/patch-ab new file mode 100644 index 00000000000..26ec0f34e29 --- /dev/null +++ b/x11/gdm/patches/patch-ab @@ -0,0 +1,12 @@ +$NetBSD: patch-ab,v 1.13 2006/05/01 19:56:04 jmmv Exp $ + +--- daemon/slave.c.orig 2006-04-14 19:53:51.000000000 +0200 ++++ daemon/slave.c +@@ -3543,6 +3543,7 @@ session_child_run (struct passwd *pwent, + close (iceauth_fd); + } + ++ NEVER_FAILS_setegid (pwent->pw_gid); + #ifdef HAVE_LOGINCAP + if (setusercontext (NULL, pwent, pwent->pw_uid, + LOGIN_SETLOGIN | LOGIN_SETPATH | -- cgit v1.2.3