| Commit message (Collapse) | Author | Age | Files | Lines |
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
-Update libtool and libltdl to 2.2.6a.
-Remove devel/libtool15 and devel/libltdl15.
-Fix ports build with libtool22/libltdl22.
-Bump ports that depend on libltdl22 due to shared library version change.
-Explain what to do update in the UPDATING.
It has been tested with GNOME2, XFCE4, KDE3, KDE4 and other many wm/desktop
and applications in the runtime.
With help: marcus and kwm
Pointyhat-exp: a few times by pav
Tested by: pgollucci, "Romain Tartière" <romain@blogreen.org>, and
a few MarcusCom CVS users. Also, I might have missed a few.
Repocopy by: marcus
Approved by: portmgr
|
| |
|
|
|
|
|
|
|
| |
Security: US-CERT Technical Cyber Security Alert TA08-079B --
MIT Kerberos Updates for Multiple Vulnerabilities
US-CERT Vulnerability Note VU#895609,
US-CERT Vulnerability Note VU#374121
MIT krb5 Security Advisory 2008-001
MIT krb5 Security Advisory 2008-002
|
| | |
|
| |
|
|
|
| |
PR: 117469
Submitted by: Karen Andrews <dearmiss@optusnet.com.au>
|
| |
|
|
| |
Pointy hat to: yours truly
|
| | |
|
| |
|
|
|
|
|
|
|
|
| |
1. MIT krb5 Security Advisory 2007-001: Telnetd allows login as arbitrary user
CVE: CVE-2007-0956
CERT: VU#220816
2. MIT krb5 Security Advisory 2007-002: KDC, kadmind stack overflow in krb5_klog_syslog
CVE: CVE-2007-0957
CERT: VU#704024
|
| |
|
|
|
| |
Obtained from: MIT krb5 Security Advisory 2007-003
Security: US-CERT Technical Cyber Security Alert TA07-093B -- MIT Kerberos Vulnerabilities
|
| |
|
|
| |
Reported by: pointyhat
|
| |
|
|
|
| |
Security: MITKRB5-SA-2006-002, MITKRB5-SA-2006-003, and
US-CERT Technical Cyber Security Alert TA07-009B
|
| |
|
|
| |
Submitted by: Paul Vixie <paul@vix.com>
|
| |
|
|
|
| |
for situations when the database is replicated to a secure environment
that does not have network access, by hand.
|
| | |
|
| | |
|
| |
|
|
| |
Approved by: portmgr (kris)
|
| | |
|
| |
|
|
| |
PR: 87888
|
| | |
|
| | |
|
| |
|
|
|
|
| |
- MIT KRB5 Security Advisory 2005-002: Buffer overflow, heap corruption in KDC
- MIT KRB5 Security Advisory 2005-003: Double free in krb5_recvauth
|
| |
|
|
| |
Package list fixup when KRB5_KRB4_COMPAT is not specified.
|
| | |
|
| |
|
|
|
| |
Approved by: portsmgr (krion)
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce
|
| | |
|
| |
|
|
|
|
| |
in KDC and libraries
Heads-up by: nectar
|
| |
|
|
| |
Heads-up by: nectar
|
| | |
|
| |
|
|
| |
Obtained from: Tom Yu <tlyu@mit.edu> on BUGTRAQ
|
| |
|
|
| |
Obtained from: Tom Yu <tlyu@MIT.EDU> on kerberos-announce list
|
| |
|
|
|
|
| |
commit fixes that error.
Reported by: bento
|
| |
|
|
|
|
| |
2. Fix build on -STABLE.
PR: 57128
|
| |
|
|
|
| |
PR: 56169
Submitted by: Sergey Matveychuk <sem@ciam.ru>
|
| | |
|
| |
|
|
| |
Submitted by: wollman
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
|
| |
|
|
|
| |
Note: Since crypto-publish.org does not yet have krb5-1.2.7 up on their
website, fetch from their site has been temporarily disabled.
|
| |
|
|
|
|
|
| |
KDC host).
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce mailing list,
MIT krb5 Security Advisory 2002-002
|
| |
|
|
|
| |
Note: Since crypto-publish.org does not yet have krb5-1.2.6 up on their
website, fetch from their site has been temporarily disabled.
|
| |
|
|
|
| |
<URL:http://online.securityfocus.com/archive/1/285308>
<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823>
|
| |
|
|
|
|
|
|
| |
ENOENT. Obtained from /cvs/krbdev/krb5/src/kdc/kdc_preauth.c,v rev 5.31
in MIT KRB5 tree (fix etype info; wrong termination condition used in
get_etype_info).
Obtained from: Sam Hartman <hartmans@mit.edu>
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
| |
now makes use of login.conf and login.access. This is performed by
using FreeBSD login(1) instead of MIT KRB5 login.krb5(8).
The MIT KRB5 login.krb5(8) can still be used by specifying "-L" in
the klogind and telnetd arguments in inetd.conf. This is documented
in a new file called README.FreeBSD.
Reviewed by: nectar
|
| |
|
|
|
|
|
|
|
|
| |
<msa@dinosauricon.com> provided the original patches.
= For users outside of the US, point to www.crypto-publish.org for the
distfiles. It was Chris Knight <chris@aims.com.au>'s idea.
Submitted by: Cy.Schubert@uumail.gov.bc.ca (MAINTAINER)
PR: ports/29865
|
| |
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
| |
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
| |
|
|
| |
Submitted by: Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
|
| |
|
|
|
|
|
|
| |
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
<URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.
Obtained from: MIT Kerberos mailing list
|
| |
|
|
|
|
|
|
| |
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
<URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.
Obtained from: MIT Kerberos mailing list
|