Commit graph

138 commits

Author SHA1 Message Date
fhajny
4ebc8705ad Make sure that LDFLAGS are not ignored. Fixes build on at least SunOS. 2016-06-21 14:58:17 +00:00
fhajny
9a7d622e2e Use REAL_ROOT_USER/REAL_ROOT_GROUP instead of ROOT_USER/ROOT_GROUP
for all pkgsrc dir/file ownership rules. Fixes unprivileged
user/group names from leaking into binary packages, manifest as
non-fatal chown/chgrp failure messages at pkg_add time.

Bump respective packages' PKGREVISION.
2016-05-17 10:32:06 +00:00
kamil
31423ed178 Fix build on recent NetBSD-current
The RTM_RESOLVE symbol has been removed after the following change in
src/sys/net/route.h:
    revision 1.98
    date: 2016-04-04 09:37:07 +0200;  author: ozaki-r;  state: Exp;  lines: +8 -6;  commitid: r0chxU5ZkTdAqh1z;
    Separate nexthop caches from the routing table

Bump PKGREVISION to 1
2016-04-17 15:33:13 +00:00
tez
5bbc10b8a1 Fix build on 64 bit intel systems with yasm installed. 2016-03-18 19:08:39 +00:00
tez
188b8d1ff4 Missed one checksum update... fixed. 2016-03-15 15:22:38 +00:00
tez
91d0631a40 Update to 1.14.1 resolving all reported vulnerabilities including:
CVE-2015-2695
CVE-2015-2696
CVE-2015-2697
CVE-2015-2698
CVE-2015-8629
CVE-2015-8630
CVE-2015-8631
2016-03-15 15:16:39 +00:00
jperkin
b5e60568fb Ensure libss is built -static, the library is not installed resulting
in runtime failures which weren't previously detected due to a bug in
check-shlibs.  Bump PKGREVISION.
2016-03-10 18:21:58 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
tez
8e879b0fa6 Fix build in case there is a system version of verto found.
No revbump because it failed to build before if there was one.
Fixes pkg/50348
2015-11-05 19:10:29 +00:00
jperkin
22c3d5dee6 Add /usr/lib/mit/bin/krb5-config as a possible location for the
krb5-config script, fixing SLES according to sobukus on IRC.
2015-11-04 15:32:34 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
wiz
2e65d464e8 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:50:58 +00:00
jperkin
9fb14aef19 Ensure we can find OpenSSL after rpath changes. 2015-05-26 13:56:16 +00:00
joerg
4f2fc835d7 Redo rpath handling as the option is leaked into the config binary.
Bump revision.
2015-03-22 20:09:09 +00:00
joerg
45c2e5bc3e GC MAKE_PROGRAM as well. 2015-03-16 10:44:23 +00:00
joerg
ea967f82bb Don't use -R without argument. Make libapputils a convenience archive as
it is. Don't depend on gmake.
2015-03-15 23:07:20 +00:00
tnn
da7dc52ac1 post-extract target needs gzip as tool 2015-03-12 14:26:11 +00:00
tez
c2d3b7a572 Backported fixes for:
http://web.mit.edu/kerberos/advisories/2015-001-patch-r111.txt
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
and:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
and
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
 (also apparently known as SA62976)
2015-02-25 22:28:58 +00:00
tez
164e0bdf9f Add patch for CVE-2014-5351 from:
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
 3bf9e33f9d.diff
2014-11-25 23:40:49 +00:00
tez
cc60b78017 Add fixes for CVE-2014-4341, CVE-2014-4342 (same patch as CVE-2014-4341)
CVE-2014-4343, CVE-2014-4344 & MITKRB5-SA-2014-001 (CVE-2014-4345).
2014-08-28 22:23:05 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
jperkin
45bc40abb4 Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
2014-03-11 14:04:57 +00:00
obache
167fa6cf42 Also define KRB5_CONFIG for the case not using builtin mit-krb5. 2014-02-28 12:17:20 +00:00
adam
e8764a7c78 Fix for Darwin version higher that 10 2014-02-13 20:31:08 +00:00
tron
c64e9eb269 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:18:26 +00:00
jperkin
80a4e644aa On SunOS, install a wrapper script for krb5-config to strip away arguments
that are unsupported by the native port of MIT KRB5, and add any flags
necessary to support the builtin version.

Fixes various packages since the change to support the SunOS builtin.

Based on patches by Richard PALO (richard@).
2013-12-11 10:27:01 +00:00
adam
17928d9904 Changes 1.10.7:
This is a bugfix release. The krb5-1.10 release series is in maintenance, and for new deployments, installers should prefer the krb5-1.11 release series or later.
* Fix a KDC locking issue that could lead to the KDC process holding a persistent lock, preventing administrative actions such as password changes.
* Fix a number of bugs related to KDC master key rollover.
* Fix a KDC null pointer dereference [CVE-2013-1418] that could affect KDCs that serve multiple realms.
2013-12-03 14:08:53 +00:00
obache
4a153fe6a6 Use find-headers instead of find-files to detect builtin header files. 2013-11-23 12:10:13 +00:00
richard
41b905137d update mit-krb5 builtin for solaris and better krb5-config support 2013-10-26 05:28:43 +00:00
joerg
4e3d5d007f Pass rpath options with correct -Wl prefix. 2013-10-20 17:56:02 +00:00
richard
008742ab03 revert API to 1.4nb1 for mit-krb5 builtin support 2013-10-12 04:24:59 +00:00
joerg
4506ea7b83 Don't use IP_PKTINFO on NetBSD, it doesn't support all required fields. 2013-08-30 12:59:22 +00:00
adam
8dc9d9eb0d Changes 1.10.6:
Fix a UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]
Improve interoperability with some Windows native PKINIT clients.
2013-06-16 07:22:47 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
tez
57ade1a60c The kpasswd service provided by kadmind was vulnerable to a UDP
"ping-pong" attack [CVE-2002-2443].  Don't respond to packets unless
they pass some basic validation, and don't respond to our own error
packets.

Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong
attack or UDP ping-pong attacks in general, but there is discussion
leading toward narrowing the definition of CVE-1999-0103 to the echo,
chargen, or other similar built-in inetd services.

cf1a0c411bvs
2013-05-13 22:42:33 +00:00
adam
df6d78c9f1 Changes 1.10.5:
This is a bugfix release. The krb5-1.10 release series is in maintenance, and for new deployments, installers should prefer the krb5-1.11 release series or later.
* Fix KDC null pointer dereference in TGS-REQ handling [CVE-2013-1416]
* Incremental propagation could erroneously act as if a slave's database were current after the slave received a full dump that failed to load.
2013-05-09 08:40:05 +00:00
tez
eac118e80f Fix for CVE-2013-1416 from:
http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7600
2013-04-23 22:09:44 +00:00
tez
2d78756888 Fix build on Solaris
(per http://old.nabble.com/Re%3A-build-problem-p34365918.html)
2013-03-14 13:53:18 +00:00
adam
6abc9286d7 Changes 1.10.4:
This is a bugfix release.
Fix null PKINIT pointer dereference vulnerabilities [CVE-2012-1016, CVE-2013-1415]
Prevent the KDC from returning a host-based service principal referral to the local realm.
2013-03-13 12:35:40 +00:00
tez
6d317fd07b Add patch for CVE-2013-1415 (SA52390) 2013-02-28 14:19:36 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
joerg
9927d30623 Ensure correct initialisation. Bump revision. 2012-12-22 02:27:56 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
marino
66505fc126 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
adam
9d58e8aad0 Changes 1.10.3:
This is a bugfix release.
* Fix KDC uninitialized pointer vulnerabilities that could lead to a denial of
  service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
* Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
  requests.
2012-08-20 08:16:26 +00:00
marino
89b4b5d538 security/mit-krb5: USE_TOOLS+= msgfmt
Note: Nobody that uses git from pkgsrc can install this package.
It conflicts with security/heimdal which is sucked in by dependencies
of scmgit-base.  Since the default way of acquiring pkgsrc on
DragonFly is via git, which is provided by the releases and daily
snapshots, effectively this can't be installed by DragonFly users.

Solving the conflict with heimdal, if possible, would be nice.
2012-08-09 20:15:20 +00:00
adam
f013b18e21 Changes 1.10.2:
This is a bugfix release.
* Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers.
* Update a workaround for a glibc bug that would cause DNS PTR queries to occur
  even when rdns = false.
* Fix a kadmind denial of service issue (null pointer dereference), which could
  only be triggered by an administrator with the "create" privilege.
  [CVE-2012-1013]

Changes 1.10.1:
This is a bugfix release.
* Fix access controls for KDB string attributes [CVE-2012-1012]
* Make the ASN.1 encoding of key version numbers interoperate with Windows
  Read-Only Domain Controllers
* Avoid generating spurious password expiry warnings in cases where the KDC
  sends an account expiry time without a password expiry time.
2012-07-16 19:12:33 +00:00
tez
f3d519bd37 Fix for CVE-2012-1013 from:
ca29094400
2012-06-06 18:17:46 +00:00
adam
e23b4ba694 Changes 1.8.6:
This is primarily a bugfix release.
* Fix an interaction in iprop that could cause spurious excess kadmind processes
  when a kprop child fails.

Changes 1.8.5:
This is primarily a bugfix release.
* Fix MITKRB5-SA-2011-006 KDC denial of service vulnerabilities
  [CVE-2011-1528 CVE-2011-1529 CVE-2011-4151].
2012-02-26 13:14:19 +00:00