Commit graph

93 commits

Author SHA1 Message Date
adam
9d58e8aad0 Changes 1.10.3:
This is a bugfix release.
* Fix KDC uninitialized pointer vulnerabilities that could lead to a denial of
  service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
* Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
  requests.
2012-08-20 08:16:26 +00:00
marino
89b4b5d538 security/mit-krb5: USE_TOOLS+= msgfmt
Note: Nobody that uses git from pkgsrc can install this package.
It conflicts with security/heimdal which is sucked in by dependencies
of scmgit-base.  Since the default way of acquiring pkgsrc on
DragonFly is via git, which is provided by the releases and daily
snapshots, effectively this can't be installed by DragonFly users.

Solving the conflict with heimdal, if possible, would be nice.
2012-08-09 20:15:20 +00:00
adam
f013b18e21 Changes 1.10.2:
This is a bugfix release.
* Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers.
* Update a workaround for a glibc bug that would cause DNS PTR queries to occur
  even when rdns = false.
* Fix a kadmind denial of service issue (null pointer dereference), which could
  only be triggered by an administrator with the "create" privilege.
  [CVE-2012-1013]

Changes 1.10.1:
This is a bugfix release.
* Fix access controls for KDB string attributes [CVE-2012-1012]
* Make the ASN.1 encoding of key version numbers interoperate with Windows
  Read-Only Domain Controllers
* Avoid generating spurious password expiry warnings in cases where the KDC
  sends an account expiry time without a password expiry time.
2012-07-16 19:12:33 +00:00
tez
f3d519bd37 Fix for CVE-2012-1013 from:
ca29094400
2012-06-06 18:17:46 +00:00
adam
e23b4ba694 Changes 1.8.6:
This is primarily a bugfix release.
* Fix an interaction in iprop that could cause spurious excess kadmind processes
  when a kprop child fails.

Changes 1.8.5:
This is primarily a bugfix release.
* Fix MITKRB5-SA-2011-006 KDC denial of service vulnerabilities
  [CVE-2011-1528 CVE-2011-1529 CVE-2011-4151].
2012-02-26 13:14:19 +00:00
tez
c04a6520cb add vendor patch 2011-006-patch-r18 from MITKRB5-SA-2011-006
this fixes CVE-2011-1528, CVE-2011-1529 & CVE-2011-4151
2011-10-23 19:58:16 +00:00
adam
e9a9cefac0 Changes 1.8.4:
This is primarily a bugfix release.
Fix vulnerabilities:
* KDC uninitialized pointer crash [MITKRB5-SA-2010-006 CVE-2010-1322]
* kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
* KDC denial of service attacks [MITKRB5-SA-2011-002 CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]
* KDC double-free when PKINIT enabled [MITKRB5-SA-2011-003 CVE-2011-0284]
* kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]
Interoperability:
* Correctly encrypt GSSAPI forwarded credentials using the session key, not
  a subkey.
* Set NT-SRV-INST on TGS principal names as expected by some Windows Server
  Domain Controllers.
* Don't reject AP-REQ messages if their PAC doesn't validate; suppress the PAC
  instead.
* Correctly validate HMAC-MD5 checksums that use DES keys
2011-07-08 09:59:28 +00:00
adam
6c122d287c Fix building with Clang 2011-06-01 09:57:23 +00:00
tez
3d74a0406d fix MITKRB5-SA-2011-004 (CVE-2011-0285) DOS in kadmind 2011-04-14 19:37:26 +00:00
tez
9dc2b934be correct openssl dependency (it needs >=0.9.8)
correct BUILDLINK_API_DEPENDS.mit-krb5
fix building where libtool chokes on "--version-info : " (at least OS X)
2011-04-09 00:16:18 +00:00
tez
b4949581c3 Add builtin support for SunOS per PR#44597 2011-04-08 17:30:35 +00:00
tez
e02c424c99 remove 3 more old patches that got missed 2011-03-22 23:35:59 +00:00
tez
dc3953a58d Update MIT Kerberos to v1.8.3 with the latest security patches up to and
including MITKRB5-SA-2011-003.

Please see http://web.mit.edu/kerberos/ for the change logs since v1.4.2

Note that the r-services, telnetd and ftpd services and the related client
applications are now in a separate pacakge security/mit-krb5-appl.
2011-03-22 23:31:04 +00:00
adam
67c5c9ef32 Detect builtin MIT Kerberos on Mac OS X 10.6.x 2010-12-05 21:56:55 +00:00
tez
9c348d6b44 add fix for CVE-2010-1323 from
http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt
2010-12-03 20:11:31 +00:00
tez
ec67e0d1e7 fix CVE-2010-1321 (MITKRB5-SA-2010-005) and take maintainership 2010-05-20 14:21:23 +00:00
joerg
2cd7bd2623 Apply some sense to the build system by always linking the .la archives
in src/lib as that is the location it wants to pick it up. Work around
the dependencies in other places by symlinking to that, effectively
reverting the direction. Link telnet(d) consistently. Add DESTDIR support.
2010-03-26 21:44:59 +00:00
tez
203778c883 Fix CVE-2009-4212 (MITKRB5-SA-2009-004) using patches from
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
(slightly adjusted for older kerberos version)
2010-02-24 19:07:51 +00:00
joerg
c569c6a51f Mark packages as MAKE_JOBS_SAFE=no that failed in a bulk build with
MAKE_JOBS=2 and worked without.
2009-06-30 00:07:09 +00:00
joerg
f0bbd1517d Remove @dirrm entries from PLISTs 2009-06-14 18:13:25 +00:00
tez
bf5c272d94 Add patches for CVE-2009-0846 & CVE-2009-0847
approved by agc
2009-04-21 18:58:17 +00:00
joerg
2d1ba244e9 Simply and speed up buildlink3.mk files and processing.
This changes the buildlink3.mk files to use an include guard for the
recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS,
BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new
variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of
enter/exit marker, which can be used to reconstruct the tree and
to determine first level includes. Avoiding := for large variables
(BUILDLINK_ORDER) speeds up parse time as += has linear complexity.
The include guard reduces system time by avoiding reading files over and
over again. For complex packages this reduces both %user and %sys time to
half of the former time.
2009-03-20 19:23:50 +00:00
wiz
f41049960a PR 40152 by Tim Zingelman:
lib/krb5/os/dnsglue.c uses statbuf structure before zeroing it.
Solaris requires it be zeroed first... all kerberos programs that
use dns lookup crash.  Zeroing before use does not break anything
on any other platforms.

Bump PKGREVISION.
2008-12-11 09:42:25 +00:00
tonnerre
dbcd463c31 Add more patches, now for MITKRB5-SA-2007-006, MITKRB5-SA-2008-001 and
MITKRB5-SA-2008-002. Bump PKGREVISION now finally.
2008-06-07 23:58:11 +00:00
tonnerre
3dba4d1622 Add patches for MITKRB5-SA-2007-004 and MITKRB5-SA-2007-005. PKGREVISION
will be bumped again once some other patches are in.
2008-06-07 22:26:10 +00:00
tonnerre
ee2541c198 Remove parts of a different security patch which slipped in but are not
supported yet. Don't bump revision as the package didn't build before.
2008-06-07 20:22:18 +00:00
tonnerre
c94122195f Add security patches for 3 Kerberos vulnerabilities:
- telnetd username and environment sanitizing vulnerabilities ("-f root")
   as described in MIT Kerberos advisory 2007-001.
 - krb5_klog_syslog() problems with overly long log strings as described
   in MIT Kerberos advisory 2007-002.
 - GSS API kg_unseal_v1() double free vulnerability as described in the
   MIT Kerberos advisory 2007-003.
2008-06-07 18:36:06 +00:00
tron
5105fb8b30 Recognize the MIT Kerberos bundled with Mac OS X Leopard. 2007-12-28 15:27:24 +00:00
gdt
4c80c2d36b Remove RESTRICTED comment about US export control. (While lots of
things are restricted, pkgsrc's labeling rules aren't intended to
address export control issues, and there are vast numbers of packages
with apparently similar export control status and no RESTRICTED.)
2007-06-22 14:20:01 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
salo
36b53788b7 Fix building with Autoconf 2.60 and newer.
Addresses PR pkg/34252 by Matthias Petermann.

Also delint a bit.
2007-01-18 17:28:24 +00:00
salo
f3624b6351 Security fix for CVE-2006-6143:
"An unauthenticated user may cause execution of arbitrary code in
 kadmind, which can compromise the Kerberos key database and host
 security.  (kadmind usually runs as root.)  Unsuccessful exploitation,
 or even accidental replication of the required conditions by
 non-malicious users, can result in kadmind crashing."

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143

Patch from MIT.
2007-01-17 23:43:47 +00:00
salo
bb3e8f5e8d Security fixes for SA21402:
"A security issue has been reported in Kerberos, which potentially can
 be exploited by malicious, local users to perform certain actions with
 escalated privileges.

 The security issue is caused due to missing checks for whether the
 "setuid()" call has succeeded in the bundled krshd and v4rcp
 applications. This can be exploited to disclose or manipulate the
 contents of arbitrary files or execute arbitrary code with root
 privileges if the "setuid()" call fails due to e.g. resource limits."

http://secunia.com/advisories/21402/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt

Bump PKGREVISION.
2006-08-09 17:31:10 +00:00
jlam
c16221a4db Change the format of BUILDLINK_ORDER to contain depth information as well,
and add a new helper target and script, "show-buildlink3", that outputs
a listing of the buildlink3.mk files included as well as the depth at
which they are included.

For example, "make show-buildlink3" in fonts/Xft2 displays:

	zlib
	fontconfig
	    iconv
	    zlib
	    freetype2
	    expat
	freetype2
	Xrender
	    renderproto
2006-07-08 23:10:35 +00:00
jlam
9430e49307 Track information in a new variable BUILDLINK_ORDER that informs us
of the order in which buildlink3.mk files are (recursively) included
by a package Makefile.
2006-07-08 22:38:58 +00:00
rillig
9fc2d7d281 Removed the superfluous "quotes" and 'quotes' from variables that don't
need them, for example RESTRICTED and SUBST_MESSAGE.*.
2006-04-22 09:22:05 +00:00
rillig
96fc47c14f Aligned the last line of the buildlink3.mk files with the first line, so
that they look nicer.
2006-04-12 10:26:59 +00:00
jlam
b06407d21b At least look for "Massachusetts Institute of Technology" as a crude
check for MIT Kerberos 5 when inspecting /usr/include/krb5.h.  Also,
bring this file more in line with heimdal/builtin.mk.
2006-04-10 18:05:16 +00:00
tron
8e9056b23c Teach Kerberos 5 to detect the MIT Kerberos 5 bundled with Mac OS X.
This stops the "gnome-vfs2" package from pulling in the "heimdal" package.
This fixes PR pkg/29946 by Juha-Matti Liukkonen.
2006-04-10 15:04:44 +00:00
reed
5abef9be14 Over 1200 files touched but no revisions bumped :)
RECOMMENDED is removed. It becomes ABI_DEPENDS.

BUILDLINK_RECOMMENDED.foo becomes BUILDLINK_ABI_DEPENDS.foo.

BUILDLINK_DEPENDS.foo becomes BUILDLINK_API_DEPENDS.foo.

BUILDLINK_DEPENDS does not change.

IGNORE_RECOMMENDED (which defaulted to "no") becomes USE_ABI_DEPENDS
which defaults to "yes".

Added to obsolete.mk checking for IGNORE_RECOMMENDED.

I did not manually go through and fix any aesthetic tab/spacing issues.

I have tested the above patch on DragonFly building and packaging
subversion and pkglint and their many dependencies.

I have also tested USE_ABI_DEPENDS=no on my NetBSD workstation (where I
have used IGNORE_RECOMMENDED for a long time). I have been an active user
of IGNORE_RECOMMENDED since it was available.

As suggested, I removed the documentation sentences suggesting bumping for
"security" issues.

As discussed on tech-pkg.

I will commit to revbump, pkglint, pkg_install, createbuildlink separately.

Note that if you use wip, it will fail!  I will commit to pkgsrc-wip
later (within day).
2006-04-06 06:21:32 +00:00
jlam
741aecb607 * Nuke all references to and definitions of INFO_DIR in package Makefiles
and replace with appropriate references to PKGINFODIR instead.

* Properly account for split info files during installation.

* Move info file listings directly into the package PLISTs.

This fixes info-file-related PLIST problems.
2006-03-20 18:15:37 +00:00
joerg
dcf9875dc5 Fix path in patch. 2006-03-17 15:44:45 +00:00
jlam
641e118d57 Drop maintainership for packages that I no longer have time to maintain. 2006-03-14 16:00:40 +00:00
joerg
98826f091f update patchsum for patch-al. 2006-03-08 17:37:14 +00:00
joerg
19e7375012 Add DragonFly support. Fallback to LINE_MAX if BUFSIZ is not defined. 2006-02-24 21:56:40 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
jlam
2558c0291d Change my MAINTAINER email address to the one I've been using for
pkgsrc work.
2005-12-17 05:20:21 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
wiz
5c11268df7 Remove some more *LEGACY* settings that are over a month old and
thus were before 2005Q3.
2005-10-05 13:29:49 +00:00