Commit graph

207 commits

Author SHA1 Message Date
Cy Schubert
632d308662 Fix LATEST_LINK. 2014-10-18 17:05:55 +00:00
Cy Schubert
a28880acce MIT Kerberos released 1.13; 1.12 becomes a maintenance release,
1.11 remains a maintenance release.

- Update security/krb5 1.12.2 --> 1.13
- Copy the old security/krb5 1.12.2 to security/krb5-112
  (now a maintenance release supported by MIT)
- Move the old krb5-maint (1.11.5: old maintenance release) to
  security/krb5-111 (the old maintenance release still supported by MIT)
2014-10-16 19:44:22 +00:00
Cy Schubert
5b227e8cf8 Update 1.12.1 --> 1.12.2.
Add readline non-default option.
2014-08-13 18:32:02 +00:00
Adam Weinberger
1c30911ff0 Rename security/ patches to reflect the files they modify. 2014-07-29 14:30:10 +00:00
Tijl Coosemans
37f54e0f66 net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample

databases/libgdamm:
- Drop :keepla
- USES=tar:bzip2
- Use INSTALL_TARGET=install-strip

databases/libgdamm5:
- Add INSTALL_TARGET=install-strip
- Drop --enable-static (inherited from old repocopy)

devel/anjuta x11-toolkits/py-gnome-extras:
- Drop :keepla

dns/powerdns dns/powerdns-devel:
- Convert to USES=libtool
- Add INSTALL_TARGET=install-strip
- Disable static modules
- Stop creating library symlinks with .0 suffix, not needed for dynamically
  opened modules

mail/dovecot2:
- Add USES=libtool

mail/dovecot2-pigeonhole:
- Drop CONFIGURE_TARGET (incorrect for Dragonfly)
- Add USES=libtool and INSTALL_TARGET=install-strip

math/gnumeric:
- USES=libtool tar:xz

Approved by:	portmgr (implicit, bump unstaged ports)
2014-07-24 18:34:16 +00:00
Cy Schubert
8e4681c7b4 Fix build when KRB5_HOME != LOCALBASE.
Submitted by:	hrs
2014-05-27 19:59:41 +00:00
Cy Schubert
c6ba72e6a0 Allow package build (make stage/make package) for non-root user.
Submitted by:	John Hein <john.hein@microsemi.com>
2014-05-06 04:04:30 +00:00
Cy Schubert
8c83d17a73 Finely tune KRB5_HOME test when using LIB_DEPENDS. in the case when
KRB5_HOME is set to LOCALBASE.
2014-04-24 03:53:30 +00:00
Cy Schubert
e39f034c5a Remove extraneious MAN assignments. 2014-04-23 02:55:24 +00:00
Brad Davis
1b1f758c54 - Add a startup script for kpropd
PR:		183502
Submitted by:	brd@
Approved by:	bdrewery@
2014-04-21 15:55:07 +00:00
Cy Schubert
e68317caf2 Fix new patch.
Point hat to:	self
2014-04-19 03:45:40 +00:00
Cy Schubert
c09eb9c5cd KRB5_HOME no longer works with LIB_DEPENDS. Mark broken when set. 2014-04-18 02:21:57 +00:00
Cy Schubert
6149f653b7 1. Fix build when using clang 3.4.
2. RTM_OLDADD and RTM_OLDDEL were removed from -stable. Thanks alfred@ for
   this patch.
3. Stagify.

Submitted by:	alfred (#2)
2014-04-17 20:06:32 +00:00
Cy Schubert
f9e42e587b Update 1.12 --> 1.12.1 2014-01-16 13:49:42 +00:00
Cy Schubert
da068efd24 Update krb5 to 1.12. Security/krb5 tracks MIT KRB5 current release.
Adjust the newly created krb5-maint with a new portname and conflicts.
Krb5-maint is a maintenance release for those who wish to use the previous
release of krb5. krb5-maint remains at 1.11.3.

Adjust CONFLICTS in security/heimdal and security/srp to account for the
newly repocopied krb5-maint.

Adjust security/Makefile to include krb5-maint.
2013-12-12 05:19:57 +00:00
Cy Schubert
8250beb020 pkg-plist fixup. 2013-12-11 20:50:17 +00:00
Cy Schubert
a8a9c98a14 Add LDAP support.
PR:		184557
Submitted by:	Erick Turnquist <jhujhiti@adjectivism.org>
2013-12-11 03:45:23 +00:00
Baptiste Daroussin
a65ed2e51b Add NO_STAGE all over the place in preparation for the staging support (cat: security) 2013-09-20 22:55:24 +00:00
Baptiste Daroussin
f56f112403 Convert to new perl framework
Convert USE_GMAKE to USES=gmake
2013-09-16 16:58:41 +00:00
Antoine Brodin
45ab3998d9 Add an empty directory created by the port to pkg-plist
Approved by:	portmgr (miwi)
2013-06-21 16:40:56 +00:00
Cy Schubert
fd0bfa7a6d Update krb5 1.11.2 --> 1.11.3.
This is a bugfix release.

* Fix a UDP ping-pong vulnerability in the kpasswd (password changing)
  service.  [CVE-2002-2443]

* Improve interoperability with some Windows native PKINIT clients.

Security:	CVE-2002-2443
2013-06-04 04:45:22 +00:00
Alex Kozlov
e159824929 - Convert USE_GETTEXT to USES (part 3)
Approved by:	portmgr (bapt)
2013-04-24 18:10:30 +00:00
Cy Schubert
9a7f529315 Update 1.11.1 --> 1.11.2
Major changes in 1.11.2 (2013-04-12)
====================================

This is a bugfix release.

* Incremental propagation could erroneously act as if a slave's
  database were current after the slave received a full dump that
  failed to load.

* gss_import_sec_context incorrectly set internal state that
  identifies whether an imported context is from an interposer
  mechanism or from the underlying mechanism.

Feature safe:	yes
2013-04-17 00:41:37 +00:00
Carlo Strub
f87124df63 - Remove A/An in COMMENT
- Trim Header where applicable
2013-03-29 19:33:41 +00:00
Cy Schubert
c886643ab6 Reset ulog if database load failed.
Avoids a slave reporting it is current when a full resync fails.

Obtained from:	https://github.com/rbasch/krb5/commit/2ef5ae0607d1c317a936e439b4be7a6f5184dc
2013-03-05 16:10:39 +00:00
Cy Schubert
2dcaa3f892 Update 1.11 --> 1.11.1.
Security:	Fix a null pointer dereference in the KDC PKINIT code [CVE-2013-1415].
2013-02-22 20:03:17 +00:00
Cy Schubert
ace0474fa7 Fix verto.h missing build error on some systems.
The following contributed by mandree@:
	- Header standardization.

	- Make use of OptionsNG.

	- Make portlint happy.
2013-01-24 14:15:26 +00:00
Cy Schubert
734550f60d Update 1.10.3 --> 1.11 2013-01-22 04:03:17 +00:00
Cy Schubert
823cac2328 Fix plist.
Feature safe:	yes
2012-11-04 02:10:49 +00:00
Cy Schubert
132c8dd868 Update krb5 1.9.2 --> 1.10.3
Feature safe:	yes
2012-11-03 18:59:37 +00:00
Cy Schubert
dac3936a56 Fix build of security/krb5 with clang.
PR:		169740
Submitted by:		Niclas Zeising <zeising@daemonic.se>
2012-07-09 19:20:09 +00:00
Dirk Meyer
2b74a89bc8 - update png to 1.5.10 2012-06-01 05:26:28 +00:00
Pav Lucistnik
ab747f70f6 - pointyhat kludge - tetex drags in port-OpenSSL on 7.X, but only as a build
dependency. Yet this triggers autodetection code in bsd.openssl.mk and
  OpenSSL dependency is registered with the resulting package, creating a
  discord between INDEX and actual package. Work around by explicitly recording
  the dependency in a way that INDEX build will see.

OK'ed by:	cy (maintainer)
Feature safe:	yes
2012-04-06 07:41:20 +00:00
Cy Schubert
4cb5bba3a9 PORTREVISION bump.
PR:		163272
Feature safe:	yes
2011-12-14 04:33:23 +00:00
Cy Schubert
9544f5eff2 Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
handling.

PR:		163272
Submitted by:	zi
Security:	6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe:	yes
2011-12-14 04:31:21 +00:00
Cy Schubert
a564f94724 Update 1.9.1 --> 1.9.2. This is a bugfix release.
Feature safe:	yes
2011-11-16 20:38:49 +00:00
Cy Schubert
6fc815c911 Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.
libgssrpc was ignorant of the remote address of the kadmin socket,
even when it's IPv4.  This made old-style GSSAPI authentication fail
because it uses the wrong channel bindings.  Fix this problem by making
clnttcp_create() get the remote address from the socket using getpeername()
if the caller doesn't provide it and it's an IPv4 address.

PR:		160500
Submitted by:	Ben Kaduk <kaduk@mit.edu>
2011-09-06 15:55:36 +00:00
Cy Schubert
fe6aa8f527 Update 1.9 --> 1.9.1.
PR:		158520
Submitted by:	Ryan Steinmetz <rpsfa@rit.edu>
2011-06-30 04:03:11 +00:00
Cy Schubert
a4eccde1aa Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()
[CVE-2011-0285]

Security:	MITKRB5-SA-2011-004, CVE-2011-0285
Feature safe:	yes
2011-04-14 00:39:25 +00:00
Cy Schubert
e95e6edcc1 Bump PORTREVISION. 2011-04-08 21:03:14 +00:00
Cy Schubert
b4f7af7927 Adjust krb5-config when $KRB5_HOME is specified. This will allow applications
linking aganst the MIT krb5 libraries to link using the correct ones.
2011-04-08 21:02:41 +00:00
Cy Schubert
3ed59e1a47 Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free when
PKINIT enabled.

Obtained from:	http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
Security:	MITKRB5-SA-2011-003, CVE-2011-0284
Feature safe:	yes
2011-03-25 00:19:02 +00:00
Cy Schubert
2d5c97dc53 Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
denial of service (MITKRB5-SA-2011-002).

Security:	MITKRB5-SA-2011-001 (CVE-2010-4022),
		MITKRB5-SA-2011-002 (CVE-2011-0281)
2011-02-11 01:04:09 +00:00
Cy Schubert
186a989ba9 Remove the OpenSSL port requirement. The base OpenSSL will work too.
Feature safe:	yes
2011-01-18 15:07:56 +00:00
Cy Schubert
4108064a78 Update from 1.8.3_2 to 1.9. 2010-12-23 01:04:41 +00:00
Ade Lovett
4a8684e352 Sync to new bsd.autotools.mk 2010-12-04 07:34:27 +00:00
Cy Schubert
13b6797ec5 Fix security vulnerabilities CVE-2010-1324, CVE-2010-1323, CVE-2010-4020,
CVE-2010-4021, and CVE-2010-1322.

PR:		152755
Submitted by:	wollman
Security:	CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021,
		and CVE-2010-1322.
Feature safe:	Yes
2010-12-02 02:09:23 +00:00
Cy Schubert
812ec0d220 Enable ksu DEBUG (-D) flag. 2010-11-04 04:37:36 +00:00
Cy Schubert
d17854089e Update to 1.8.3.
PR:		149299
Submitted by:	gwollman
2010-08-05 22:37:11 +00:00
Cy Schubert
524a2efde7 Apply patch for MIT KRB5 security vulnerability MITKRB5-SA-2010-005.
PR:		146939
Submitted by:	wollman
Security:	MIT krb5 Security Advisory 2010-005
2010-05-25 05:14:15 +00:00