Cy Schubert
632d308662
Fix LATEST_LINK.
2014-10-18 17:05:55 +00:00
Cy Schubert
a28880acce
MIT Kerberos released 1.13; 1.12 becomes a maintenance release,
...
1.11 remains a maintenance release.
- Update security/krb5 1.12.2 --> 1.13
- Copy the old security/krb5 1.12.2 to security/krb5-112
(now a maintenance release supported by MIT)
- Move the old krb5-maint (1.11.5: old maintenance release) to
security/krb5-111 (the old maintenance release still supported by MIT)
2014-10-16 19:44:22 +00:00
Cy Schubert
5b227e8cf8
Update 1.12.1 --> 1.12.2.
...
Add readline non-default option.
2014-08-13 18:32:02 +00:00
Adam Weinberger
1c30911ff0
Rename security/ patches to reflect the files they modify.
2014-07-29 14:30:10 +00:00
Tijl Coosemans
37f54e0f66
net/openldap24-*:
...
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD
databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip
databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
databases/libgdamm:
- Drop :keepla
- USES=tar:bzip2
- Use INSTALL_TARGET=install-strip
databases/libgdamm5:
- Add INSTALL_TARGET=install-strip
- Drop --enable-static (inherited from old repocopy)
devel/anjuta x11-toolkits/py-gnome-extras:
- Drop :keepla
dns/powerdns dns/powerdns-devel:
- Convert to USES=libtool
- Add INSTALL_TARGET=install-strip
- Disable static modules
- Stop creating library symlinks with .0 suffix, not needed for dynamically
opened modules
mail/dovecot2:
- Add USES=libtool
mail/dovecot2-pigeonhole:
- Drop CONFIGURE_TARGET (incorrect for Dragonfly)
- Add USES=libtool and INSTALL_TARGET=install-strip
math/gnumeric:
- USES=libtool tar:xz
Approved by: portmgr (implicit, bump unstaged ports)
2014-07-24 18:34:16 +00:00
Cy Schubert
8e4681c7b4
Fix build when KRB5_HOME != LOCALBASE.
...
Submitted by: hrs
2014-05-27 19:59:41 +00:00
Cy Schubert
c6ba72e6a0
Allow package build (make stage/make package) for non-root user.
...
Submitted by: John Hein <john.hein@microsemi.com>
2014-05-06 04:04:30 +00:00
Cy Schubert
8c83d17a73
Finely tune KRB5_HOME test when using LIB_DEPENDS. in the case when
...
KRB5_HOME is set to LOCALBASE.
2014-04-24 03:53:30 +00:00
Cy Schubert
e39f034c5a
Remove extraneious MAN assignments.
2014-04-23 02:55:24 +00:00
Brad Davis
1b1f758c54
- Add a startup script for kpropd
...
PR: 183502
Submitted by: brd@
Approved by: bdrewery@
2014-04-21 15:55:07 +00:00
Cy Schubert
e68317caf2
Fix new patch.
...
Point hat to: self
2014-04-19 03:45:40 +00:00
Cy Schubert
c09eb9c5cd
KRB5_HOME no longer works with LIB_DEPENDS. Mark broken when set.
2014-04-18 02:21:57 +00:00
Cy Schubert
6149f653b7
1. Fix build when using clang 3.4.
...
2. RTM_OLDADD and RTM_OLDDEL were removed from -stable. Thanks alfred@ for
this patch.
3. Stagify.
Submitted by: alfred (#2 )
2014-04-17 20:06:32 +00:00
Cy Schubert
f9e42e587b
Update 1.12 --> 1.12.1
2014-01-16 13:49:42 +00:00
Cy Schubert
da068efd24
Update krb5 to 1.12. Security/krb5 tracks MIT KRB5 current release.
...
Adjust the newly created krb5-maint with a new portname and conflicts.
Krb5-maint is a maintenance release for those who wish to use the previous
release of krb5. krb5-maint remains at 1.11.3.
Adjust CONFLICTS in security/heimdal and security/srp to account for the
newly repocopied krb5-maint.
Adjust security/Makefile to include krb5-maint.
2013-12-12 05:19:57 +00:00
Cy Schubert
8250beb020
pkg-plist fixup.
2013-12-11 20:50:17 +00:00
Cy Schubert
a8a9c98a14
Add LDAP support.
...
PR: 184557
Submitted by: Erick Turnquist <jhujhiti@adjectivism.org>
2013-12-11 03:45:23 +00:00
Baptiste Daroussin
a65ed2e51b
Add NO_STAGE all over the place in preparation for the staging support (cat: security)
2013-09-20 22:55:24 +00:00
Baptiste Daroussin
f56f112403
Convert to new perl framework
...
Convert USE_GMAKE to USES=gmake
2013-09-16 16:58:41 +00:00
Antoine Brodin
45ab3998d9
Add an empty directory created by the port to pkg-plist
...
Approved by: portmgr (miwi)
2013-06-21 16:40:56 +00:00
Cy Schubert
fd0bfa7a6d
Update krb5 1.11.2 --> 1.11.3.
...
This is a bugfix release.
* Fix a UDP ping-pong vulnerability in the kpasswd (password changing)
service. [CVE-2002-2443]
* Improve interoperability with some Windows native PKINIT clients.
Security: CVE-2002-2443
2013-06-04 04:45:22 +00:00
Alex Kozlov
e159824929
- Convert USE_GETTEXT to USES (part 3)
...
Approved by: portmgr (bapt)
2013-04-24 18:10:30 +00:00
Cy Schubert
9a7f529315
Update 1.11.1 --> 1.11.2
...
Major changes in 1.11.2 (2013-04-12)
====================================
This is a bugfix release.
* Incremental propagation could erroneously act as if a slave's
database were current after the slave received a full dump that
failed to load.
* gss_import_sec_context incorrectly set internal state that
identifies whether an imported context is from an interposer
mechanism or from the underlying mechanism.
Feature safe: yes
2013-04-17 00:41:37 +00:00
Carlo Strub
f87124df63
- Remove A/An in COMMENT
...
- Trim Header where applicable
2013-03-29 19:33:41 +00:00
Cy Schubert
c886643ab6
Reset ulog if database load failed.
...
Avoids a slave reporting it is current when a full resync fails.
Obtained from: https://github.com/rbasch/krb5/commit/2ef5ae0607d1c317a936e439b4be7a6f5184dc
2013-03-05 16:10:39 +00:00
Cy Schubert
2dcaa3f892
Update 1.11 --> 1.11.1.
...
Security: Fix a null pointer dereference in the KDC PKINIT code [CVE-2013-1415].
2013-02-22 20:03:17 +00:00
Cy Schubert
ace0474fa7
Fix verto.h missing build error on some systems.
...
The following contributed by mandree@:
- Header standardization.
- Make use of OptionsNG.
- Make portlint happy.
2013-01-24 14:15:26 +00:00
Cy Schubert
734550f60d
Update 1.10.3 --> 1.11
2013-01-22 04:03:17 +00:00
Cy Schubert
823cac2328
Fix plist.
...
Feature safe: yes
2012-11-04 02:10:49 +00:00
Cy Schubert
132c8dd868
Update krb5 1.9.2 --> 1.10.3
...
Feature safe: yes
2012-11-03 18:59:37 +00:00
Cy Schubert
dac3936a56
Fix build of security/krb5 with clang.
...
PR: 169740
Submitted by: Niclas Zeising <zeising@daemonic.se>
2012-07-09 19:20:09 +00:00
Dirk Meyer
2b74a89bc8
- update png to 1.5.10
2012-06-01 05:26:28 +00:00
Pav Lucistnik
ab747f70f6
- pointyhat kludge - tetex drags in port-OpenSSL on 7.X, but only as a build
...
dependency. Yet this triggers autodetection code in bsd.openssl.mk and
OpenSSL dependency is registered with the resulting package, creating a
discord between INDEX and actual package. Work around by explicitly recording
the dependency in a way that INDEX build will see.
OK'ed by: cy (maintainer)
Feature safe: yes
2012-04-06 07:41:20 +00:00
Cy Schubert
4cb5bba3a9
PORTREVISION bump.
...
PR: 163272
Feature safe: yes
2011-12-14 04:33:23 +00:00
Cy Schubert
9544f5eff2
Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
...
handling.
PR: 163272
Submitted by: zi
Security: 6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe: yes
2011-12-14 04:31:21 +00:00
Cy Schubert
a564f94724
Update 1.9.1 --> 1.9.2. This is a bugfix release.
...
Feature safe: yes
2011-11-16 20:38:49 +00:00
Cy Schubert
6fc815c911
Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.
...
libgssrpc was ignorant of the remote address of the kadmin socket,
even when it's IPv4. This made old-style GSSAPI authentication fail
because it uses the wrong channel bindings. Fix this problem by making
clnttcp_create() get the remote address from the socket using getpeername()
if the caller doesn't provide it and it's an IPv4 address.
PR: 160500
Submitted by: Ben Kaduk <kaduk@mit.edu>
2011-09-06 15:55:36 +00:00
Cy Schubert
fe6aa8f527
Update 1.9 --> 1.9.1.
...
PR: 158520
Submitted by: Ryan Steinmetz <rpsfa@rit.edu>
2011-06-30 04:03:11 +00:00
Cy Schubert
a4eccde1aa
Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()
...
[CVE-2011-0285]
Security: MITKRB5-SA-2011-004, CVE-2011-0285
Feature safe: yes
2011-04-14 00:39:25 +00:00
Cy Schubert
e95e6edcc1
Bump PORTREVISION.
2011-04-08 21:03:14 +00:00
Cy Schubert
b4f7af7927
Adjust krb5-config when $KRB5_HOME is specified. This will allow applications
...
linking aganst the MIT krb5 libraries to link using the correct ones.
2011-04-08 21:02:41 +00:00
Cy Schubert
3ed59e1a47
Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free when
...
PKINIT enabled.
Obtained from: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
Security: MITKRB5-SA-2011-003, CVE-2011-0284
Feature safe: yes
2011-03-25 00:19:02 +00:00
Cy Schubert
2d5c97dc53
Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
...
denial of service (MITKRB5-SA-2011-002).
Security: MITKRB5-SA-2011-001 (CVE-2010-4022),
MITKRB5-SA-2011-002 (CVE-2011-0281)
2011-02-11 01:04:09 +00:00
Cy Schubert
186a989ba9
Remove the OpenSSL port requirement. The base OpenSSL will work too.
...
Feature safe: yes
2011-01-18 15:07:56 +00:00
Cy Schubert
4108064a78
Update from 1.8.3_2 to 1.9.
2010-12-23 01:04:41 +00:00
Ade Lovett
4a8684e352
Sync to new bsd.autotools.mk
2010-12-04 07:34:27 +00:00
Cy Schubert
13b6797ec5
Fix security vulnerabilities CVE-2010-1324, CVE-2010-1323, CVE-2010-4020,
...
CVE-2010-4021, and CVE-2010-1322.
PR: 152755
Submitted by: wollman
Security: CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021,
and CVE-2010-1322.
Feature safe: Yes
2010-12-02 02:09:23 +00:00
Cy Schubert
812ec0d220
Enable ksu DEBUG (-D) flag.
2010-11-04 04:37:36 +00:00
Cy Schubert
d17854089e
Update to 1.8.3.
...
PR: 149299
Submitted by: gwollman
2010-08-05 22:37:11 +00:00
Cy Schubert
524a2efde7
Apply patch for MIT KRB5 security vulnerability MITKRB5-SA-2010-005.
...
PR: 146939
Submitted by: wollman
Security: MIT krb5 Security Advisory 2010-005
2010-05-25 05:14:15 +00:00