Commit graph

174 commits

Author SHA1 Message Date
Cy Schubert
4cb5bba3a9 PORTREVISION bump.
PR:		163272
Feature safe:	yes
2011-12-14 04:33:23 +00:00
Cy Schubert
9544f5eff2 Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
handling.

PR:		163272
Submitted by:	zi
Security:	6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe:	yes
2011-12-14 04:31:21 +00:00
Cy Schubert
a564f94724 Update 1.9.1 --> 1.9.2. This is a bugfix release.
Feature safe:	yes
2011-11-16 20:38:49 +00:00
Cy Schubert
6fc815c911 Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.
libgssrpc was ignorant of the remote address of the kadmin socket,
even when it's IPv4.  This made old-style GSSAPI authentication fail
because it uses the wrong channel bindings.  Fix this problem by making
clnttcp_create() get the remote address from the socket using getpeername()
if the caller doesn't provide it and it's an IPv4 address.

PR:		160500
Submitted by:	Ben Kaduk <kaduk@mit.edu>
2011-09-06 15:55:36 +00:00
Cy Schubert
fe6aa8f527 Update 1.9 --> 1.9.1.
PR:		158520
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
2011-06-30 04:03:11 +00:00
Cy Schubert
a4eccde1aa Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()
[CVE-2011-0285]

Security:	MITKRB5-SA-2011-004, CVE-2011-0285
Feature safe:	yes
2011-04-14 00:39:25 +00:00
Cy Schubert
e95e6edcc1 Bump PORTREVISION. 2011-04-08 21:03:14 +00:00
Cy Schubert
b4f7af7927 Adjust krb5-config when $KRB5_HOME is specified. This will allow applications
linking aganst the MIT krb5 libraries to link using the correct ones.
2011-04-08 21:02:41 +00:00
Cy Schubert
3ed59e1a47 Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free when
PKINIT enabled.

Obtained from:	http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
Security:	MITKRB5-SA-2011-003, CVE-2011-0284
Feature safe:	yes
2011-03-25 00:19:02 +00:00
Cy Schubert
2d5c97dc53 Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
denial of service (MITKRB5-SA-2011-002).

Security:	MITKRB5-SA-2011-001 (CVE-2010-4022),
		MITKRB5-SA-2011-002 (CVE-2011-0281)
2011-02-11 01:04:09 +00:00
Cy Schubert
186a989ba9 Remove the OpenSSL port requirement. The base OpenSSL will work too.
Feature safe:	yes
2011-01-18 15:07:56 +00:00
Cy Schubert
4108064a78 Update from 1.8.3_2 to 1.9. 2010-12-23 01:04:41 +00:00
Ade Lovett
4a8684e352 Sync to new bsd.autotools.mk 2010-12-04 07:34:27 +00:00
Cy Schubert
13b6797ec5 Fix security vulnerabilities CVE-2010-1324, CVE-2010-1323, CVE-2010-4020,
CVE-2010-4021, and CVE-2010-1322.

PR:		152755
Submitted by:	wollman
Security:	CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021,
		and CVE-2010-1322.
Feature safe:	Yes
2010-12-02 02:09:23 +00:00
Cy Schubert
812ec0d220 Enable ksu DEBUG (-D) flag. 2010-11-04 04:37:36 +00:00
Cy Schubert
d17854089e Update to 1.8.3.
PR:		149299
Submitted by:	gwollman
2010-08-05 22:37:11 +00:00
Cy Schubert
524a2efde7 Apply patch for MIT KRB5 security vulnerability MITKRB5-SA-2010-005.
PR:		146939
Submitted by:	wollman
Security:	MIT krb5 Security Advisory 2010-005
2010-05-25 05:14:15 +00:00
Philip M. Gollucci
8e261ebb13 - No longer broken on -current b/c of utmpx changes
PR:             ports/146384
Submitted by:   pgollucci@ (myself), others
Approved by:    maintainer timeout (cy@, 16 days)
2010-05-24 00:01:05 +00:00
Cy Schubert
1a0ed7c73e Welcome the new krb5-1.8.1. Significant changes include the removal of
the MIT KRB5 applications (now in a separate tarball and port).
2010-04-26 03:48:43 +00:00
Cy Schubert
3c82bcd5d8 MFkrb5-17. 2010-04-26 03:23:08 +00:00
Pav Lucistnik
8ada9590ab - Mark BROKEN: does not compile
Reported by:	pointyhat
2010-04-14 20:21:10 +00:00
Dirk Meyer
de78af3ac5 - update to 1.4.1
Reviewed by:	exp8 run on pointyhat
Supported by:	miwi
2010-03-28 06:47:48 +00:00
Martin Wilke
92d0cbeefe - Mark BROKEN: fails to build with new utmpx
Reported by:	pointyhat
2010-03-17 06:51:26 +00:00
Dirk Meyer
ca9c60461c - update to jpeg-8 2010-02-05 11:46:55 +00:00
Cy Schubert
c318193ee2 Remove commented out option from a bygone era. 2009-10-13 21:37:19 +00:00
Cy Schubert
dff989f0d4 Remove redundant length check. 2009-08-28 20:02:01 +00:00
Jeremy Messenger
789d75c728 -Repocopy devel/libtool15 -> libtool22 and libltdl15 -> libltdl22.
-Update libtool and libltdl to 2.2.6a.
-Remove devel/libtool15 and devel/libltdl15.
-Fix ports build with libtool22/libltdl22.
-Bump ports that depend on libltdl22 due to shared library version change.
-Explain what to do update in the UPDATING.

It has been tested with GNOME2, XFCE4, KDE3, KDE4 and other many wm/desktop
and applications in the runtime.

With help:	marcus and kwm
Pointyhat-exp:	a few times by pav
Tested by:	pgollucci, "Romain Tartière" <romain@blogreen.org>, and
		a few MarcusCom CVS users. Also, I might have missed a few.
Repocopy by:	marcus
Approved by:	portmgr
2009-08-02 19:36:34 +00:00
Dirk Meyer
eca78ec61b - bump all port that indirectly depends on libjpeg and have not yet been bumped or updated
Requested by:	edwin
2009-07-31 13:57:52 +00:00
Cy Schubert
6d4aa839c8 Convert missing WANT_KRB5_DOC pieces.
Add HTML documentation OPTION knob.
2008-05-23 21:01:58 +00:00
Cy Schubert
f52aaf28df Implement OPTIONS menu.
Implement options that will allow the user to:

	- rename ftp and ftpd to kftp and kftpd
	- rename telnet and telnetd to ktelnet and ktelnetd
	- rename rlogin to krlogin
	- rename rsh to krsh
	- rename rcp to krcp

This avoids shadowing by or being shadowed by, depending on one's PATH,
system utilities of the same name.
2008-05-14 23:06:13 +00:00
Cy Schubert
14ff4ec24c Fixes for multiple vulnerabilities.
Security:	US-CERT Technical Cyber Security Alert TA08-079B --
			MIT Kerberos Updates for Multiple Vulnerabilities
		US-CERT Vulnerability Note VU#895609,
		US-CERT Vulnerability Note VU#374121
		MIT krb5 Security Advisory 2008-001
		MIT krb5 Security Advisory 2008-002
2008-03-19 19:26:53 +00:00
Cy Schubert
348ae1db44 Fix pkinit install brokenness under 5.5 and 6.2.
Approved by:	portmgr (linimon)
2008-01-06 14:53:30 +00:00
Mark Linimon
8c1c9234be Mark as broken: fails to install.
Approved by:	portmgr (self)
2007-11-24 23:14:35 +00:00
Cy Schubert
f1625cd26f Fix build for OpenSSL 0.9.8.
PR:		117552
Submitted by:	Hirohisa Yamaguchi <umq@umo.co.jp>
2007-10-29 23:23:27 +00:00
Cy Schubert
55bf5d1092 Fix build under 7.0-PRERELEASE. 2007-10-29 22:49:49 +00:00
Cy Schubert
c44c48c59e Fix erroneous patch.
PR:		117469
Submitted by:	Karen Andrews <dearmiss@optusnet.com.au>
2007-10-25 21:15:23 +00:00
Cy Schubert
3d878157d5 Update 1.6.2 --> 1.6.3
Security:	fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow
		fix CVE-2007-4000 modify_policy vulnerability

Also:		add PKINIT support
2007-10-23 03:41:37 +00:00
Cy Schubert
9c73679b41 Patch for MIT krb5 Security Advisory 2007-006 - kadmind RPC lib buffer
overflow, uninitialized pointer
Security:	MIT krb5 Security Advisory 2007-006
2007-09-11 23:52:19 +00:00
Cy Schubert
36f5a2384a Update 1.6.1 --> 1.6.2 2007-07-11 16:51:31 +00:00
Cy Schubert
b6d944b8d8 Patches for:
MITKRB5-SA-2007-004: kadmind affected by multiple RPC library vulnerabilities
MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow

Security:	US CERT Technical Cyber Security Alert TA07-177A --
		MIT Kerberos Vulnerabilities
2007-06-26 23:01:44 +00:00
Florent Thoumie
d4f0d0048a - Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
2007-05-19 20:36:56 +00:00
Cy Schubert
b4d312cbea Remove defunct (zero length) patch files.
Pointy hat to:		yours truly
2007-05-02 21:17:33 +00:00
Cy Schubert
9abfecf5f8 Update from 1.6 to 1.6.1. 2007-04-23 22:10:09 +00:00
Cy Schubert
ec9ba12ea8 MIT KRB5 Security patches:
1. MIT krb5 Security Advisory 2007-001: Telnetd allows login as arbitrary user
   CVE: CVE-2007-0956
   CERT: VU#220816

2. MIT krb5 Security Advisory 2007-002: KDC, kadmind stack overflow in krb5_klog_syslog
   CVE: CVE-2007-0957
   CERT: VU#704024
2007-04-04 21:12:17 +00:00
Cy Schubert
d3dd8048be Fix double-free vulnerability in kadmind (via GSS-API library).
Obtained from:	MIT krb5 Security Advisory 2007-003
Security:	US-CERT Technical Cyber Security Alert TA07-093B -- MIT Kerberos Vulnerabilities
2007-04-04 01:40:12 +00:00
Pav Lucistnik
0925dae118 - Fix after objformat removal
Reported by:	pointyhat
2007-03-28 17:31:59 +00:00
Pav Lucistnik
2df76eb0a7 - Remove support for a.out format and PORTOBJFORMAT variable from individual
ports

With hat:	portmgr
2007-01-30 10:25:34 +00:00
Cy Schubert
f1f7b82718 Change a dependency from teTeX-base to the smaller texinfo. 2007-01-15 03:08:17 +00:00
Cy Schubert
6426536102 Include new documentation dependencies.
Conditionally build and install documentation using a new knob.
2007-01-14 05:13:32 +00:00
Cy Schubert
99854179ca Update 1.5.1 --> 1.6
Security:	MITKRB5-SA-2006-002,  MITKRB5-SA-2006-003, and
		US-CERT Technical Cyber Security Alert TA07-009B
2007-01-10 05:06:45 +00:00