Commit graph

106 commits

Author SHA1 Message Date
adam
9c5a2715fb Changes 1.10.6:
Fix a UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]
Improve interoperability with some Windows native PKINIT clients.
2013-06-16 07:22:47 +00:00
wiz
047a7f787e Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
tez
fb11f09744 The kpasswd service provided by kadmind was vulnerable to a UDP
"ping-pong" attack [CVE-2002-2443].  Don't respond to packets unless
they pass some basic validation, and don't respond to our own error
packets.

Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong
attack or UDP ping-pong attacks in general, but there is discussion
leading toward narrowing the definition of CVE-1999-0103 to the echo,
chargen, or other similar built-in inetd services.

cf1a0c411bvs
2013-05-13 22:42:33 +00:00
adam
32787e11b9 Changes 1.10.5:
This is a bugfix release. The krb5-1.10 release series is in maintenance, and for new deployments, installers should prefer the krb5-1.11 release series or later.
* Fix KDC null pointer dereference in TGS-REQ handling [CVE-2013-1416]
* Incremental propagation could erroneously act as if a slave's database were current after the slave received a full dump that failed to load.
2013-05-09 08:40:05 +00:00
tez
8d5d864e20 Fix for CVE-2013-1416 from:
http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7600
2013-04-23 22:09:44 +00:00
tez
a53aa08b39 Fix build on Solaris
(per http://old.nabble.com/Re%3A-build-problem-p34365918.html)
2013-03-14 13:53:18 +00:00
adam
b37abcaee2 Changes 1.10.4:
This is a bugfix release.
Fix null PKINIT pointer dereference vulnerabilities [CVE-2012-1016, CVE-2013-1415]
Prevent the KDC from returning a host-based service principal referral to the local realm.
2013-03-13 12:35:40 +00:00
tez
16f4b33f2a Add patch for CVE-2013-1415 (SA52390) 2013-02-28 14:19:36 +00:00
jperkin
84991145cf PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
joerg
1075433c80 Ensure correct initialisation. Bump revision. 2012-12-22 02:27:56 +00:00
asau
40b91e7ab9 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
marino
da604f2b06 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
wiz
3184463075 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
adam
810c47f2a9 Changes 1.10.3:
This is a bugfix release.
* Fix KDC uninitialized pointer vulnerabilities that could lead to a denial of
  service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
* Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
  requests.
2012-08-20 08:16:26 +00:00
marino
1f04ab1257 security/mit-krb5: USE_TOOLS+= msgfmt
Note: Nobody that uses git from pkgsrc can install this package.
It conflicts with security/heimdal which is sucked in by dependencies
of scmgit-base.  Since the default way of acquiring pkgsrc on
DragonFly is via git, which is provided by the releases and daily
snapshots, effectively this can't be installed by DragonFly users.

Solving the conflict with heimdal, if possible, would be nice.
2012-08-09 20:15:20 +00:00
adam
e0d8895900 Changes 1.10.2:
This is a bugfix release.
* Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers.
* Update a workaround for a glibc bug that would cause DNS PTR queries to occur
  even when rdns = false.
* Fix a kadmind denial of service issue (null pointer dereference), which could
  only be triggered by an administrator with the "create" privilege.
  [CVE-2012-1013]

Changes 1.10.1:
This is a bugfix release.
* Fix access controls for KDB string attributes [CVE-2012-1012]
* Make the ASN.1 encoding of key version numbers interoperate with Windows
  Read-Only Domain Controllers
* Avoid generating spurious password expiry warnings in cases where the KDC
  sends an account expiry time without a password expiry time.
2012-07-16 19:12:33 +00:00
tez
778871df8f Fix for CVE-2012-1013 from:
ca29094400
2012-06-06 18:17:46 +00:00
adam
f9d435b66b Changes 1.8.6:
This is primarily a bugfix release.
* Fix an interaction in iprop that could cause spurious excess kadmind processes
  when a kprop child fails.

Changes 1.8.5:
This is primarily a bugfix release.
* Fix MITKRB5-SA-2011-006 KDC denial of service vulnerabilities
  [CVE-2011-1528 CVE-2011-1529 CVE-2011-4151].
2012-02-26 13:14:19 +00:00
tez
f4124f9abe add vendor patch 2011-006-patch-r18 from MITKRB5-SA-2011-006
this fixes CVE-2011-1528, CVE-2011-1529 & CVE-2011-4151
2011-10-23 19:58:16 +00:00
adam
c95b6cfb1a Changes 1.8.4:
This is primarily a bugfix release.
Fix vulnerabilities:
* KDC uninitialized pointer crash [MITKRB5-SA-2010-006 CVE-2010-1322]
* kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
* KDC denial of service attacks [MITKRB5-SA-2011-002 CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]
* KDC double-free when PKINIT enabled [MITKRB5-SA-2011-003 CVE-2011-0284]
* kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]
Interoperability:
* Correctly encrypt GSSAPI forwarded credentials using the session key, not
  a subkey.
* Set NT-SRV-INST on TGS principal names as expected by some Windows Server
  Domain Controllers.
* Don't reject AP-REQ messages if their PAC doesn't validate; suppress the PAC
  instead.
* Correctly validate HMAC-MD5 checksums that use DES keys
2011-07-08 09:59:28 +00:00
adam
ddb30a933a Fix building with Clang 2011-06-01 09:57:23 +00:00
tez
388e116bb9 fix MITKRB5-SA-2011-004 (CVE-2011-0285) DOS in kadmind 2011-04-14 19:37:26 +00:00
tez
1c5206aa83 correct openssl dependency (it needs >=0.9.8)
correct BUILDLINK_API_DEPENDS.mit-krb5
fix building where libtool chokes on "--version-info : " (at least OS X)
2011-04-09 00:16:18 +00:00
tez
d625f1997f Add builtin support for SunOS per PR#44597 2011-04-08 17:30:35 +00:00
tez
0988999e87 remove 3 more old patches that got missed 2011-03-22 23:35:59 +00:00
tez
491d6a5a3b Update MIT Kerberos to v1.8.3 with the latest security patches up to and
including MITKRB5-SA-2011-003.

Please see http://web.mit.edu/kerberos/ for the change logs since v1.4.2

Note that the r-services, telnetd and ftpd services and the related client
applications are now in a separate pacakge security/mit-krb5-appl.
2011-03-22 23:31:04 +00:00
adam
efb355b5ec Detect builtin MIT Kerberos on Mac OS X 10.6.x 2010-12-05 21:56:55 +00:00
tez
63e878c120 add fix for CVE-2010-1323 from
http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt
2010-12-03 20:11:31 +00:00
tez
8f97c4caf2 fix CVE-2010-1321 (MITKRB5-SA-2010-005) and take maintainership 2010-05-20 14:21:23 +00:00
joerg
e68c11cbbf Apply some sense to the build system by always linking the .la archives
in src/lib as that is the location it wants to pick it up. Work around
the dependencies in other places by symlinking to that, effectively
reverting the direction. Link telnet(d) consistently. Add DESTDIR support.
2010-03-26 21:44:59 +00:00
tez
78465e099c Fix CVE-2009-4212 (MITKRB5-SA-2009-004) using patches from
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
(slightly adjusted for older kerberos version)
2010-02-24 19:07:51 +00:00
joerg
76f5c1b551 Mark packages as MAKE_JOBS_SAFE=no that failed in a bulk build with
MAKE_JOBS=2 and worked without.
2009-06-30 00:07:09 +00:00
joerg
4bfd4a2628 Remove @dirrm entries from PLISTs 2009-06-14 18:13:25 +00:00
tez
9b622f53e6 Add patches for CVE-2009-0846 & CVE-2009-0847
approved by agc
2009-04-21 18:58:17 +00:00
joerg
2d1ba244e9 Simply and speed up buildlink3.mk files and processing.
This changes the buildlink3.mk files to use an include guard for the
recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS,
BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new
variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of
enter/exit marker, which can be used to reconstruct the tree and
to determine first level includes. Avoiding := for large variables
(BUILDLINK_ORDER) speeds up parse time as += has linear complexity.
The include guard reduces system time by avoiding reading files over and
over again. For complex packages this reduces both %user and %sys time to
half of the former time.
2009-03-20 19:23:50 +00:00
wiz
f41049960a PR 40152 by Tim Zingelman:
lib/krb5/os/dnsglue.c uses statbuf structure before zeroing it.
Solaris requires it be zeroed first... all kerberos programs that
use dns lookup crash.  Zeroing before use does not break anything
on any other platforms.

Bump PKGREVISION.
2008-12-11 09:42:25 +00:00
tonnerre
dbcd463c31 Add more patches, now for MITKRB5-SA-2007-006, MITKRB5-SA-2008-001 and
MITKRB5-SA-2008-002. Bump PKGREVISION now finally.
2008-06-07 23:58:11 +00:00
tonnerre
3dba4d1622 Add patches for MITKRB5-SA-2007-004 and MITKRB5-SA-2007-005. PKGREVISION
will be bumped again once some other patches are in.
2008-06-07 22:26:10 +00:00
tonnerre
ee2541c198 Remove parts of a different security patch which slipped in but are not
supported yet. Don't bump revision as the package didn't build before.
2008-06-07 20:22:18 +00:00
tonnerre
c94122195f Add security patches for 3 Kerberos vulnerabilities:
- telnetd username and environment sanitizing vulnerabilities ("-f root")
   as described in MIT Kerberos advisory 2007-001.
 - krb5_klog_syslog() problems with overly long log strings as described
   in MIT Kerberos advisory 2007-002.
 - GSS API kg_unseal_v1() double free vulnerability as described in the
   MIT Kerberos advisory 2007-003.
2008-06-07 18:36:06 +00:00
tron
5105fb8b30 Recognize the MIT Kerberos bundled with Mac OS X Leopard. 2007-12-28 15:27:24 +00:00
gdt
4c80c2d36b Remove RESTRICTED comment about US export control. (While lots of
things are restricted, pkgsrc's labeling rules aren't intended to
address export control issues, and there are vast numbers of packages
with apparently similar export control status and no RESTRICTED.)
2007-06-22 14:20:01 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
salo
36b53788b7 Fix building with Autoconf 2.60 and newer.
Addresses PR pkg/34252 by Matthias Petermann.

Also delint a bit.
2007-01-18 17:28:24 +00:00
salo
f3624b6351 Security fix for CVE-2006-6143:
"An unauthenticated user may cause execution of arbitrary code in
 kadmind, which can compromise the Kerberos key database and host
 security.  (kadmind usually runs as root.)  Unsuccessful exploitation,
 or even accidental replication of the required conditions by
 non-malicious users, can result in kadmind crashing."

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143

Patch from MIT.
2007-01-17 23:43:47 +00:00
salo
bb3e8f5e8d Security fixes for SA21402:
"A security issue has been reported in Kerberos, which potentially can
 be exploited by malicious, local users to perform certain actions with
 escalated privileges.

 The security issue is caused due to missing checks for whether the
 "setuid()" call has succeeded in the bundled krshd and v4rcp
 applications. This can be exploited to disclose or manipulate the
 contents of arbitrary files or execute arbitrary code with root
 privileges if the "setuid()" call fails due to e.g. resource limits."

http://secunia.com/advisories/21402/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt

Bump PKGREVISION.
2006-08-09 17:31:10 +00:00
jlam
c16221a4db Change the format of BUILDLINK_ORDER to contain depth information as well,
and add a new helper target and script, "show-buildlink3", that outputs
a listing of the buildlink3.mk files included as well as the depth at
which they are included.

For example, "make show-buildlink3" in fonts/Xft2 displays:

	zlib
	fontconfig
	    iconv
	    zlib
	    freetype2
	    expat
	freetype2
	Xrender
	    renderproto
2006-07-08 23:10:35 +00:00
jlam
9430e49307 Track information in a new variable BUILDLINK_ORDER that informs us
of the order in which buildlink3.mk files are (recursively) included
by a package Makefile.
2006-07-08 22:38:58 +00:00
rillig
9fc2d7d281 Removed the superfluous "quotes" and 'quotes' from variables that don't
need them, for example RESTRICTED and SUBST_MESSAGE.*.
2006-04-22 09:22:05 +00:00
rillig
96fc47c14f Aligned the last line of the buildlink3.mk files with the first line, so
that they look nicer.
2006-04-12 10:26:59 +00:00