1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-04 01:48:54 +00:00
Commit Graph

28 Commits

Author SHA1 Message Date
Cy Schubert
c5dd5e6d13 Put SONAME entries into shared libraries.
Submitted by:	wollman
2003-05-07 21:43:40 +00:00
Cy Schubert
b19f46658c Update 1.2.7 --> 1.2.8. 2003-05-07 03:47:49 +00:00
Cy Schubert
af7a454fd3 Patches from:
- MITKRB5-SA-2003-005:
       Buffer overrun and underrun in principal name handling

  - MITKRB5-SA-2003-004:
       Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
       compromise possible.

  - MITKRB5-SA-2003-003:
       Faulty length checks in xdrmem_getbytes may allow kadmind DoS.

  - Additional patches from RedHat.

Approved by:	kris (wearing his portmgr hat)
Obtained from:	MIT Website and Nalin Dahyabhai <nalin@redhat.com>
2003-03-21 00:54:06 +00:00
Cy Schubert
e781a319dc Update 1.2.6 --> 1.2.7
Note:	Since crypto-publish.org does not yet have krb5-1.2.7 up on their
	website, fetch from their site has been temporarily disabled.
2002-11-16 00:02:13 +00:00
Cy Schubert
cf7aca2a64 Fix buffer overflow in kadmind4 (remote user can gain root access to
KDC host).

Obtained from:	Tom Yu <tlyu@mit.edu> on kerberos-announce mailing list,
		MIT krb5 Security Advisory 2002-002
2002-10-23 22:30:39 +00:00
Cy Schubert
495424cc3f Update 1.2.5 --> 1.2.6
Note:	Since crypto-publish.org does not yet have krb5-1.2.6 up on their
	website, fetch from their site has been temporarily disabled.
2002-09-13 13:46:48 +00:00
Jacques Vidrine
20b7146972 Correct Sun RPC buffer overflow.
<URL:http://online.securityfocus.com/archive/1/285308>
<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823>
2002-08-02 18:22:45 +00:00
Cy Schubert
60b5569db4 Fix problem with V4 keys. We should get KRB5_KDB_NO_MATCHING_KEY, not
ENOENT.  Obtained from /cvs/krbdev/krb5/src/kdc/kdc_preauth.c,v rev 5.31
in MIT KRB5 tree (fix etype info; wrong termination condition used in
get_etype_info).

Obtained from:	Sam Hartman <hartmans@mit.edu>
2002-06-26 04:49:07 +00:00
Cy Schubert
c0f94d44f3 Update 1.2.2 -> 1.2.3 2002-01-16 03:17:24 +00:00
Cy Schubert
6108625cb9 In order to make the MIT KRB5 port compatible with FreeBSD, the port
now makes use of login.conf and login.access.  This is performed by
using FreeBSD login(1) instead of MIT KRB5 login.krb5(8).

The MIT KRB5 login.krb5(8) can still be used by specifying "-L" in
the klogind and telnetd arguments in inetd.conf.  This is documented
in a new file called README.FreeBSD.

Reviewed by:	nectar
2002-01-08 15:05:08 +00:00
Jacques Vidrine
dd4cf80985 = Modify `ksu' so that it uses the login cap database. Michael Allman
<msa@dinosauricon.com> provided the original patches.

= For users outside of the US, point to www.crypto-publish.org for the
  distfiles.  It was Chris Knight <chris@aims.com.au>'s idea.

Submitted by:	Cy.Schubert@uumail.gov.bc.ca (MAINTAINER)
PR:		ports/29865
2001-09-07 19:53:09 +00:00
Jacques Vidrine
818599d4d6 Update telnetd vulnerability fixes from FreeBSD.
Submitted by:	Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
2001-07-24 16:47:04 +00:00
Jacques Vidrine
8ab8ce5e6e Update telnetd vulnerability fixes from FreeBSD.
Submitted by:	Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
2001-07-24 15:28:25 +00:00
Jacques Vidrine
7749fc1146 Merge telnetd vulnerability fix from FreeBSD.
Submitted by:	Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
2001-07-20 16:53:32 +00:00
Jacques Vidrine
9168f72db8 Security fix:
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
  See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
  <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.

Obtained from:  MIT Kerberos mailing list
2001-04-27 18:15:34 +00:00
Jacques Vidrine
3f37ef937e Security fix:
``Buffer overflows exist in the FTP daemon included with MIT krb5.''
See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
<URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.

Obtained from:	MIT Kerberos mailing list
2001-04-27 18:15:00 +00:00
Jacques Vidrine
ddfc9c62a8 Update 1.2.1 -> 1.2.2 2001-03-02 17:33:57 +00:00
Jacques Vidrine
a865f0187c kshd has /etc/nologin hardcoded instead of using _PATH_NOLOGIN
from <paths.h> (if available) like login.krb5 does.   As a result,
on FreeBSD 4.2 these two programs end up using different paths
for the nologin file (which is /var/run/nologin on FreeBSD).

Submitted by:	<djm@test.pubnix.com>
2001-01-09 16:25:22 +00:00
Jacques Vidrine
071860d8ce Update 1.1.1 -> 1.2 2000-06-24 01:48:11 +00:00
Jacques Vidrine
001fea0ac5 Update 1.1 -> 1.1.1 2000-01-16 19:10:58 +00:00
Jacques Vidrine
f91c2d7892 Fix for abort in login.krb5 (segment violation when trying to get a
TGT).

Obtained from:		MIT Kerberos GNATS PR krb5-appl/762, 763
1999-10-13 18:43:59 +00:00
Jacques Vidrine
5f0c4b6514 Update 1.0.6 -> 1.1 1999-10-04 14:32:28 +00:00
Jacques Vidrine
b17353afd8 Update 1.0.5 -> 1.0.6 1999-05-27 02:08:26 +00:00
Jacques Vidrine
e5ee607b5d Teach krlogind, telnetd, et. al. about FreeBSD's available ptys.
In other words,
  /dev/pty[p-zP-T][0-9a-f] -> /dev/pty[p-sP-S][0-9a-v]

Submitted by:	John Polstra <jdp@polstra.com>
1999-04-05 23:36:46 +00:00
Steve Price
769a61ee49 Make this work with current's new version of texinfo.
PR:		9587
Submitted by:	Sheldon Hearn <axl@iafrica.com>
1999-01-26 01:45:28 +00:00
Dima Ruban
2bb6d97578 Use more sane CMD_PATH. 1998-08-03 06:33:07 +00:00
Jacques Vidrine
6b7ea58f15 Additional patches (already committed to krb5-current):
* Paths corrected in applications
* ftpd now logs to facility LOG_FTP
* use openpty to obtain pseudo-terminal
* corrected detection of TCL libraries
* fix a forwarding bug
* add -m flag to ksu (preserve USER, HOME, SHELL)
* cosmetic bug fix to telnet.c
Submitted by:	Dima Ruban <dima@best.net>
1998-07-06 18:59:06 +00:00
Jacques Vidrine
7a09e241f4 New port, KerberosV 1.0.5.
PR:		ports/6870
Submitted by:	Jacques Vidrine <n@nectar.com>
1998-07-06 02:28:42 +00:00