summaryrefslogtreecommitdiff
path: root/security/mit-krb5/Makefile
AgeCommit message (Collapse)AuthorFilesLines
2009-04-21Add patches for CVE-2009-0846 & CVE-2009-0847tez1-2/+2
approved by agc
2008-12-11PR 40152 by Tim Zingelman:wiz1-2/+2
lib/krb5/os/dnsglue.c uses statbuf structure before zeroing it. Solaris requires it be zeroed first... all kerberos programs that use dns lookup crash. Zeroing before use does not break anything on any other platforms. Bump PKGREVISION.
2008-06-07Add more patches, now for MITKRB5-SA-2007-006, MITKRB5-SA-2008-001 andtonnerre1-2/+2
MITKRB5-SA-2008-002. Bump PKGREVISION now finally.
2008-06-07Add security patches for 3 Kerberos vulnerabilities:tonnerre1-2/+2
- telnetd username and environment sanitizing vulnerabilities ("-f root") as described in MIT Kerberos advisory 2007-001. - krb5_klog_syslog() problems with overly long log strings as described in MIT Kerberos advisory 2007-002. - GSS API kg_unseal_v1() double free vulnerability as described in the MIT Kerberos advisory 2007-003.
2007-06-22Remove RESTRICTED comment about US export control. (While lots ofgdt1-3/+1
things are restricted, pkgsrc's labeling rules aren't intended to address export control issues, and there are vast numbers of packages with apparently similar export control status and no RESTRICTED.)
2007-01-18Fix building with Autoconf 2.60 and newer.salo1-5/+62
Addresses PR pkg/34252 by Matthias Petermann. Also delint a bit.
2007-01-17Security fix for CVE-2006-6143:salo1-2/+2
"An unauthenticated user may cause execution of arbitrary code in kadmind, which can compromise the Kerberos key database and host security. (kadmind usually runs as root.) Unsuccessful exploitation, or even accidental replication of the required conditions by non-malicious users, can result in kadmind crashing." http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143 Patch from MIT.
2006-08-09Security fixes for SA21402:salo1-2/+2
"A security issue has been reported in Kerberos, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to missing checks for whether the "setuid()" call has succeeded in the bundled krshd and v4rcp applications. This can be exploited to disclose or manipulate the contents of arbitrary files or execute arbitrary code with root privileges if the "setuid()" call fails due to e.g. resource limits." http://secunia.com/advisories/21402/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt Bump PKGREVISION.
2006-04-22Removed the superfluous "quotes" and 'quotes' from variables that don'trillig1-2/+2
need them, for example RESTRICTED and SUBST_MESSAGE.*.
2006-03-20* Nuke all references to and definitions of INFO_DIR in package Makefilesjlam1-11/+7
and replace with appropriate references to PKGINFODIR instead. * Properly account for split info files during installation. * Move info file listings directly into the package PLISTs. This fixes info-file-related PLIST problems.
2006-03-14Drop maintainership for packages that I no longer have time to maintain.jlam1-2/+2
2005-12-29Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mkjlam1-2/+1
automatically detects whether we want the pkginstall machinery to be used by the package Makefile.
2005-12-17Change my MAINTAINER email address to the one I've been using forjlam1-2/+2
pkgsrc work.
2005-12-05Ran "pkglint --autofix", which corrected some of the quoting issues inrillig1-4/+4
CONFIGURE_ARGS.
2005-12-05Fixed pkglint warnings. The warnings are mostly quoting issues, forrillig1-4/+4
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some other changes are outlined in http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-10-05Remove some more *LEGACY* settings that are over a month old andwiz1-3/+1
thus were before 2005Q3.
2005-09-22Update security/mit-krb5 to version 1.4.2 Changes from version 1.4jlam1-2/+2
include: * Fix [MITKRB5-SA-2005-002] KDC double-free and heap overflow. * Fix [MITKRB5-SA-2005-003] krb5_recvauth() double-free.
2005-07-15Drop distinction between PKGSRC_USE_TOOLS and USE_TOOLS by makingjlam1-3/+2
PKGSRC_USE_TOOLS go away. There is now only a single USE_TOOLS variable that specifies all of the tools we need to build/run the package.
2005-06-20Disable thread support per request of jlam.kristerw1-5/+3
Bump PKGREVISION.
2005-06-16This package need pthreads in order to build.kristerw1-1/+4
2005-06-01Remove mk/autoconf.mk and mk/automake.mk and replace their usage withjlam1-4/+3
USE_TOOLS and any of "autoconf", "autoconf213", "automake" or "automake14". Also, we don't need to call the auto* tools via ${ACLOCAL}, ${AUTOCONF}, etc., since the tools framework takes care to symlink the correct tool to the correct name, so we can just use aclocal, autoconf, etc.
2005-05-31Rename option prefix-cmds to kerberos-prefix-cmds. Backwardsdillo1-4/+5
compatibility provided via PKG_OPTIONS_LEGACY_OPTS.
2005-05-31Packages have no business modifying PKG_DEFAULT_OPTIONS -- it's adillo1-5/+3
user settable variable. Set PKG_SUGGESTED_OPTIONS instead. Also, make use of PKG_OPTIONS_LEGACY_VARS. Reviewed by wiz.
2005-05-22Remove the old tools framework and references to _USE_NEW_TOOLS.jlam1-8/+1
2005-05-16This package needs gzcat to extract the .tar.gz file inside the originaljlam1-1/+5
.tar file. Also, fix the yacc silliness while we're here.
2005-04-14Remove unused section... MIT krb5 apparently now detects NetBSD's utmpxjlam1-9/+1
implementation correctly on NetBSD>=2.0.
2005-04-11Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.tv1-2/+1
2005-04-10Patch from http://web.mit.edu/kerberos/advisories/2005-001-patch_1.4.txtjlam1-1/+2
which fixes MITKRB5-SA-2005-001 (CAN-2005-0468 & CAN-2005-0469) relating to buffer overflows in the telnet client. Bump PKGREVISION to 1.
2005-04-10Updated security/mit-krb5 to krb5-1.4. Changes from version 1.3.6 include:jlam1-14/+15
* Merged Athena telnetd changes for creating a new option for requiring encryption. * Add implementation of the RPCSEC_GSS authentication flavor to the RPC library. * The kadmind4 backwards-compatibility admin server and the v5passwdd backwards-compatibility password-changing server have been removed. * Thread safety for krb5 libraries. * Yarrow code now uses AES. * Merged Athena changes to allow ftpd to require encrypted passwords. * Incorporate gss_krb5_set_allowable_enctypes() and gss_krb5_export_lucid_sec_context(), which are needed for NFSv4. * Fix heap buffer overflow in password history mechanism. [MITKRB5-SA-2004-004]
2004-12-28The default location of the pkgsrc-installed rc.d scripts is nowreed1-1/+2
under share/examples/rc.d. The variable name already was named RCD_SCRIPTS_EXAMPLEDIR. This is from ideas from Greg Woods and others. Also bumped PKGREVISION for all packages using RCD_SCRIPTS mechanism (as requested by wiz).
2004-12-23Update security/mit-krb5 to 1.3.6.jlam1-27/+13
NOTE: THIS IS A SECURITY UPDATE. Changes from version 1.3.4 include: * [2841] Fix heap buffer overflow in password history mechanism. [MITKRB5-SA-2004-004] * [2682] Fix ftpd hang caused by empty PASS command. * [2686] Fix double-free errors. [MITKRB5-SA-2004-002] * [2687] Fix denial-of-service vulnerability in ASN.1 decoder. [MITKRB5-SA-2004-003]
2004-10-03Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10tv1-2/+2
in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include.
2004-09-15Force using the BSD utmp interface on NetBSD until the configurejlam1-1/+9
scripts can be taught how to properly detect our utmpx implementation. This should fix the build on NetBSD-2.0 and -current.
2004-09-07Apply the patches for security/mit-krb5 that fix MITKRB5-SA-2004-00{2,3}.jlam1-2/+12
Bump the PKGREVISION for this security update.
2004-08-22Change the way that legacy USE_* and FOO_USE_* options are convertedjlam1-8/+3
into the bsd.options.mk framework. Instead of appending to ${PKG_OPTIONS_VAR}, it appends to PKG_DEFAULT_OPTIONS. This causes the default options to be the union of PKG_DEFAULT_OPTIONS and any old USE_* and FOO_USE_* settings. This fixes PR pkg/26590.
2004-07-30Convert to use bsd.options.mk. The relevant options variable to setjlam1-3/+15
for each package can be determined by invoking: make show-var VARNAME=PKG_OPTIONS_VAR The old options are still supported unless the variable named in PKG_OPTIONS_VAR is set within make(1) (usually via /etc/mk.conf).
2004-07-24Bump PKGREVISION for last change.jlam1-1/+2
2004-07-24Honor VARBASE.jlam1-2/+2
2004-06-24Update to security/mit-krb5 to 1.3.4. Major changes from version 1.3.3jlam1-3/+2
include a fix for security advisory [MITKRB-SA-2004-001]: http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt Please read the security advisory to see if you are affected and should update your MIT krb5 installation.
2004-05-10Correct PLIST when not renaming the applications.kristerw1-1/+2
Bump PKGREVISION.
2004-05-10Move WRKSRC from the DISTNAME section to silence a pkglint FATAL error.kristerw1-2/+3
2004-04-26Updated security/mit-krb5 to 1.3.3. Changes from version 1.3.2 include:jlam1-11/+7
[2284] Fixed accept_sec_context to use a replay cache in the GSS_C_NO_CREDENTIAL case. [2453] The AES string-to-key function no longer returns a pointer to stack memory when given a password longer than 64 characters. [2277] In sendto_kdc, a socket leak on connection failure was fixed. [2384] A memory leak in the TCP handling code in the KDC has been fixed.
2004-04-08Use ${PREFIX}/${INFO_DIR} instead of ${PREFIX}/info forreed1-3/+3
info documentation. (Okay'd by jlam.)
2004-03-30Updated security/mit-krb5 to 1.3.2. Changes from version 1.3.1 include:jlam1-14/+6
* Support for AES in GSSAPI has been implemented. This corresponds to the in-progress work in the IETF (CFX). * To avoid compatibility problems, unrecognized TGS options will now be ignored. * 128-bit AES has been added to the default enctypes. * AES cryptosystem now chains IVs. This WILL break backwards compatibility for the kcmd applications, if they are using AES session keys. * Assorted minor bug fixes and plugged memory leaks.
2004-03-30Import MIT Kerberos 5 as security/mit-krb5. This package is partly basedjlam1-0/+121
on the wip/mit-krb5 package by Jeremy Reed, but heavily modified by me to libtoolize the build. Kerberos V5 is an authentication system developed at MIT. It is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography. (Kerberos 5 is discussed in RFC 1510.) This package provides Kerberos and GSSAPI (Generic Security Services Application Programming Interface) development headers and libraries. It also includes Kerberos ticket and principal tools, and Kerberized r-services, telnet and ftp services.