Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
This is a slave port. You may also want to view the commits to the master port: security/krb5-121 |
Commit | Credits | Log message |
1.6.3_5 14 May 2008 23:06:14 |
cy |
Implement OPTIONS menu.
Implement options that will allow the user to:
- rename ftp and ftpd to kftp and kftpd
- rename telnet and telnetd to ktelnet and ktelnetd
- rename rlogin to krlogin
- rename rsh to krsh
- rename rcp to krcp
This avoids shadowing by or being shadowed by, depending on one's PATH,
system utilities of the same name. |
1.6.3_5 19 Mar 2008 19:26:53 |
cy |
Fixes for multiple vulnerabilities.
Security: US-CERT Technical Cyber Security Alert TA08-079B --
MIT Kerberos Updates for Multiple Vulnerabilities
US-CERT Vulnerability Note VU#895609,
US-CERT Vulnerability Note VU#374121
MIT krb5 Security Advisory 2008-001
MIT krb5 Security Advisory 2008-002 |
1.6.3_4 06 Jan 2008 14:53:30 |
cy |
Fix pkinit install brokenness under 5.5 and 6.2.
Approved by: portmgr (linimon) |
1.6.3_3 24 Nov 2007 23:14:35 |
linimon |
Mark as broken: fails to install.
Approved by: portmgr (self) |
1.6.3_3 29 Oct 2007 23:23:27 |
cy |
Fix build for OpenSSL 0.9.8.
PR: 117552
Submitted by: Hirohisa Yamaguchi <umq@umo.co.jp> |
1.6.3_2 29 Oct 2007 22:49:49 |
cy |
Fix build under 7.0-PRERELEASE. |
1.6.3_1 25 Oct 2007 21:15:23 |
cy |
Fix erroneous patch.
PR: 117469
Submitted by: Karen Andrews <dearmiss@optusnet.com.au> |
1.6.3 23 Oct 2007 03:41:37 |
cy |
Update 1.6.2 --> 1.6.3
Security: fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow
fix CVE-2007-4000 modify_policy vulnerability
Also: add PKINIT support |
1.6.2_1 11 Sep 2007 23:52:19 |
cy |
Patch for MIT krb5 Security Advisory 2007-006 - kadmind RPC lib buffer
overflow, uninitialized pointer
Security: MIT krb5 Security Advisory 2007-006 |
1.6.2 11 Jul 2007 16:51:31 |
cy |
Update 1.6.1 --> 1.6.2 |
1.6.1_2 26 Jun 2007 23:01:44 |
cy |
Patches for:
MITKRB5-SA-2007-004: kadmind affected by multiple RPC library vulnerabilities
MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow
Security: US CERT Technical Cyber Security Alert TA07-177A --
MIT Kerberos Vulnerabilities |
1.6.1_1 19 May 2007 20:32:57 |
flz |
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}. |
1.6.1 02 May 2007 21:17:33 |
cy |
Remove defunct (zero length) patch files.
Pointy hat to: yours truly |
1.6.1 23 Apr 2007 22:10:09 |
cy |
Update from 1.6 to 1.6.1. |
1.6_2 04 Apr 2007 21:12:17 |
cy |
MIT KRB5 Security patches:
1. MIT krb5 Security Advisory 2007-001: Telnetd allows login as arbitrary user
CVE: CVE-2007-0956
CERT: VU#220816
2. MIT krb5 Security Advisory 2007-002: KDC, kadmind stack overflow in
krb5_klog_syslog
CVE: CVE-2007-0957
CERT: VU#704024 |
1.6_1 04 Apr 2007 01:40:12 |
cy |
Fix double-free vulnerability in kadmind (via GSS-API library).
Obtained from: MIT krb5 Security Advisory 2007-003
Security: US-CERT Technical Cyber Security Alert TA07-093B -- MIT Kerberos
Vulnerabilities |
1.6 28 Mar 2007 17:32:00 |
pav |
- Fix after objformat removal
Reported by: pointyhat |
1.6 30 Jan 2007 10:25:34 |
pav |
- Remove support for a.out format and PORTOBJFORMAT variable from individual
ports
With hat: portmgr |
1.6 15 Jan 2007 03:08:17 |
cy |
Change a dependency from teTeX-base to the smaller texinfo. |
1.6 14 Jan 2007 05:13:32 |
cy |
Include new documentation dependencies.
Conditionally build and install documentation using a new knob. |
1.6 10 Jan 2007 05:06:46 |
cy |
Update 1.5.1 --> 1.6
Security: MITKRB5-SA-2006-002, MITKRB5-SA-2006-003, and
US-CERT Technical Cyber Security Alert TA07-009B |
1.5.1_1 14 Nov 2006 02:06:07 |
laszlof |
Register conflicts for srp in security/heimdal, security/krb4, and
securiry/krb5.
Bump PORTREVISION accordingly.
PR: ports/105442
Submitted by: Ruben van Staveren <ruben@verweg.com>
Reviewed by: shaun@, cy@
Approved by: flz (mentor) |
1.5.1 17 Sep 2006 00:48:42 |
cy |
Update krb5-1.5 --> krb5-1.5.1
Submitted by: Paul Vixie <paul@vix.com> |
1.5_1 16 Jul 2006 17:49:46 |
cy |
Cause the KDC to also listen on the loopback interface. This is useful
for situations when the database is replicated to a secure environment
that does not have network access, by hand. |
1.5 16 Jul 2006 16:15:09 |
cy |
Fix plugin loader. This fixes krb5kdc and kdb5_util. |
1.5 14 Jul 2006 18:37:11 |
cy |
Update 1.4.3 --> 1.5 |
1.4.3 13 May 2006 04:15:53 |
edwin |
Remove USE_REINPLACE from all categories starting with S |
1.4.3 23 Feb 2006 10:40:45 |
ade |
Conversion to a single libtool environment.
Approved by: portmgr (kris) |
1.4.3 24 Jan 2006 01:03:33 |
edwin |
SHA256ify
Approved by: krion@ |
1.4.3 05 Dec 2005 02:34:07 |
edwin |
Remove install-info from Makefile, it's automatically done when INFO is defined |
1.4.3 04 Dec 2005 10:58:19 |
edwin |
Add INFO macro |
1.4.3 25 Nov 2005 19:40:48 |
cy |
Improve runtime performance on Sparc 64 platform. |
1.4.3 23 Nov 2005 21:57:18 |
cy |
Fix the Sparc 64 build. |
1.4.3 22 Nov 2005 22:01:58 |
cy |
Flag Sparc64 build as broken. |
1.4.3 18 Nov 2005 00:38:05 |
cy |
Update 1.4.2 --> 1.4.3 |
1.4.2_2 15 Nov 2005 06:52:12 |
ade |
Mass-conversion to the USE_AUTOTOOLS New World Order. The code present
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.
Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.
Preliminary documentation can be found at:
http://people.FreeBSD.org/~ade/autotools.txt
which is in the process of being SGMLized before introduction into the
Porters Handbook.
Light blue touch-paper. Run. |
1.4.2_2 08 Nov 2005 18:51:23 |
cy |
Fix FreeBSD-4.11 build problem
PR: 87888 |
1.4.2_1 01 Nov 2005 04:01:11 |
cy |
Fix makeinfo problem under FreeBSD-6.0. |
1.4.2 31 Oct 2005 21:39:16 |
cy |
Makeinfo 4.8 problem. |
1.4.2 29 Oct 2005 18:45:28 |
cy |
Relocate BROKEN conditional. |
1.4.2 29 Oct 2005 17:34:32 |
cy |
Fails to build on 4.11. |
1.4.2 28 Oct 2005 05:59:16 |
kris |
BROKEN: Does not build |
1.4.2 08 Oct 2005 19:57:44 |
pav |
- Set CONFLICTS with heimdal and krb4
- Portlint
PR: ports/85027
Submitted by: lofi
Approved by: maintainer timeout (cy, 7 weeks) |
1.4.2 04 Oct 2005 22:09:08 |
cy |
Update 1.4.1 --> 1.4.2 |
1.4.1_1 12 Jul 2005 21:29:27 |
cy |
Fix:
- MIT KRB5 Security Advisory 2005-002: Buffer overflow, heap corruption in KDC
- MIT KRB5 Security Advisory 2005-003: Double free in krb5_recvauth |
1.4.1 23 Apr 2005 01:49:07 |
cy |
Update 1.4 --> 1.4.1.
Package list fixup when KRB5_KRB4_COMPAT is not specified. |
1.4 19 Apr 2005 21:14:37 |
cy |
Packing list fixups.
Noticed by: kris
Pointy hat to: yours truly |
1.4 13 Apr 2005 23:24:48 |
cy |
Remove NDEBUG flag as it fails to build at some installations. |
1.4 13 Apr 2005 03:09:14 |
cy |
Update web page URL. |
1.4 13 Apr 2005 03:05:17 |
cy |
Update 1.3.6 --> 1.4 |
1.3.6_1 31 Mar 2005 18:46:44 |
cy |
Implement a fix for MITKRB5-SA-2005-001: buffer overflows in telnet client.
Approved by: portsmgr (krion)
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce |
1.3.6 21 Dec 2004 01:38:02 |
cy |
Update 1.3.5 --> 1.3.6 |
1.3.5 21 Dec 2004 00:24:18 |
cy |
Crypto-publish.org no longer maintains a current release of MIT-KRB5.
Remove code to alternatively fetch from that site. |
1.3.5 20 Oct 2004 20:20:06 |
cy |
Update 1.3.4 --> 1.3.5 |
1.3.4_2 01 Sep 2004 19:55:26 |
cy |
Fix MIT krb5 Security Advisory 2004-002: double-free vulnerabilities
in KDC and libraries
Heads-up by: nectar |
1.3.4_1 01 Sep 2004 15:01:20 |
cy |
Fix MITKRB5-SA-2004-003: ASN.1 decoder denial-of-service.
Heads-up by: nectar |
1.3.4 11 Jun 2004 23:08:57 |
cy |
Update KRB5 1.3.3 --> 1.3.4 |
1.3.3_2 04 Jun 2004 16:37:32 |
cy |
Updated patch for MITKRB5-SA-2004-001: krb5_aname_to_localname buffer overrun.
Obtained from: Tom Yu <tlyu@mit.edu> on BUGTRAQ |
1.3.3_1 02 Jun 2004 19:08:34 |
cy |
Fix MITKRB5-SA-2004-001: buffer overflows in krb5_aname_to_localname
Obtained from: Tom Yu <tlyu@MIT.EDU> on kerberos-announce list |
1.3.3 07 Apr 2004 00:28:04 |
cy |
Update 1.3.2 --> 1.3.3 |
1.3.2 28 Feb 2004 21:25:21 |
cy |
- Update MIT KRB5 1.3.1 --> 1.3.2. (As crypto-publish.org does not have
1.3.2 yet, when USE_KRB5_TARBALL=CRYPTO-PUBLISH is specified, 1.3.1
will be installed.)
- Add SIZE to distinfo |
1.3.1_3 21 Feb 2004 04:39:05 |
cy |
Use ports infrastructure provided PERL5 variable to locate Perl
interpreter. |
1.3.1_3 07 Feb 2004 04:14:39 |
cy |
Define unique LATEST_LINK.
Reported by: kris |
1.3.1_3 04 Feb 2004 05:10:27 |
marcus |
Bump PORTREVISION on all ports that depend on gettext to aid with upgrading.
(Part 1) |
1.3.1_2 25 Jan 2004 22:08:19 |
cy |
Change to src/include/netdb.h 1.31 caused a compile error. This
commit fixes that error.
Reported by: bento |
1.3.1_1 23 Nov 2003 21:48:54 |
cy |
Fix crypto-publish extract. |
1.3.1_1 10 Nov 2003 23:30:32 |
cy |
Add missing slash (/) to the end of MIT MASTER_SITE. |
1.3.1_1 10 Nov 2003 23:22:16 |
cy |
MIT has removed the web form, downloads of MIT KRB5 can be automated.
Unfortunately MIT and crypto-publish.org distribute two distinctly
different tarballs and the user must select the source/format they
wish to fetch. MIT now becomes the default. |
1.3.1_1 08 Nov 2003 23:08:25 |
cy |
1. Fix pkg-plist.
2. Fix build on -STABLE.
PR: 57128 |
1.3.1 03 Nov 2003 03:56:42 |
kris |
Mark BROKEN (see bento logs). These ports are scheduled for removal
after Feb 2 2004 if they are still broken at that time and no fixes
have been submitted by PR. |
1.3.1 28 Oct 2003 02:42:41 |
kris |
BROKEN: Broken pkg-plist |
1.3.1 13 Sep 2003 02:32:33 |
cy |
The `man2html' script that krb5 uses is written in Perl.
Noticed by: wollman
Approved by: marcus (wearing his portsmgr hat) |
1.3.1 10 Sep 2003 00:03:09 |
cy |
Crypto-publish.org is now distributing krb5-1.3.1. |
1.3.1 10 Sep 2003 00:00:42 |
cy |
Patch to fix compiles under -STABLE (RELENG_4).
PR: 56169
Submitted by: Sergey Matveychuk <sem@ciam.ru> |
1.3.1 08 Aug 2003 23:35:18 |
cy |
Update 1.3 --> 1.3.1 |
1.3 08 Aug 2003 01:20:19 |
cy |
Update 1.2.8 --> 1.3 |
1.2.8_1 07 May 2003 21:43:40 |
cy |
Put SONAME entries into shared libraries.
Submitted by: wollman |
1.2.8 07 May 2003 04:13:08 |
cy |
Change default for V4 compatibility to reflect best practices
for new installations.
Submitted by: wollman |
1.2.8 07 May 2003 04:09:40 |
cy |
Default is to fetch from crypto-publish.org. USA_RESIDENT replaced
by USE_MIT_TARBALL. Users can still fetch manually from MIT by
setting USE_MIT_TARBALL=YES.
Suggested by: wollman |
1.2.8 07 May 2003 03:47:49 |
cy |
Update 1.2.7 --> 1.2.8. |
1.2.7_1 21 Mar 2003 00:54:06 |
cy |
Patches from:
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com> |
1.2.7 07 Mar 2003 06:10:51 |
ade |
Clear moonlight beckons.
Requiem mors pacem pkg-comment,
And be calm ports tree.
E Nomini Patri, E Fili, E Spiritu Sancti. |
1.2.7 22 Feb 2003 16:12:23 |
nork |
Remove RESTRICTED tag for crypto stuff.
Approved by: kris (implicitly) |
1.2.7 16 Nov 2002 00:02:13 |
cy |
Update 1.2.6 --> 1.2.7
Note: Since crypto-publish.org does not yet have krb5-1.2.7 up on their
website, fetch from their site has been temporarily disabled. |
1.2.6_1 07 Nov 2002 05:46:03 |
cy |
Use PORTCOMMENT. |
1.2.6_1 28 Oct 2002 18:28:38 |
cy |
Fix pkg-plist when KRB5_KRB4_COMPAT=NO is specified.
Submitted by: Craig Boston <craig@olyun.gank.org> |
1.2.6_1 25 Oct 2002 15:03:56 |
cy |
Circumvent the use of bison, use FreeBSD yacc instead.
PR: 44446 |
1.2.6_1 23 Oct 2002 22:30:39 |
cy |
Fix buffer overflow in kadmind4 (remote user can gain root access to
KDC host).
Obtained from: Tom Yu <tlyu@mit.edu> on kerberos-announce mailing list,
MIT krb5 Security Advisory 2002-002 |
1.2.6 25 Sep 2002 17:50:00 |
cy |
Crypto-publish.org has finally put krb5-1.2.6 up on their site. The
patch reimplements code to fetch MIT Kerberos from their site when
USA_RESIDENT=NO.
Approved by: kris |
1.2.6 13 Sep 2002 13:46:48 |
cy |
Update 1.2.5 --> 1.2.6
Note: Since crypto-publish.org does not yet have krb5-1.2.6 up on their
website, fetch from their site has been temporarily disabled. |
1.2.5_2 17 Aug 2002 00:29:41 |
cy |
Fix extract for non-root users.
Noticed by: nectar
Pointy hat to: cy |
1.2.5_2 02 Aug 2002 18:22:45 |
nectar |
Correct Sun RPC buffer overflow.
<URL:http://online.securityfocus.com/archive/1/285308>
<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823> |
1.2.5_1 01 Jul 2002 06:20:38 |
cy |
README.FreeBSD fix.
PR: 39936
Submitted by: Matthew West <mwest@uct.ac.za> |
1.2.5_1 26 Jun 2002 04:49:07 |
cy |
Fix problem with V4 keys. We should get KRB5_KDB_NO_MATCHING_KEY, not
ENOENT. Obtained from /cvs/krbdev/krb5/src/kdc/kdc_preauth.c,v rev 5.31
in MIT KRB5 tree (fix etype info; wrong termination condition used in
get_etype_info).
Obtained from: Sam Hartman <hartmans@mit.edu> |
1.2.5 16 Jun 2002 12:44:07 |
cy |
I add missing krb5-config. |
1.2.5 03 May 2002 02:20:17 |
cy |
Now that www.crypto-publish.org has put the latest version of MIT KRB5
up on their website again, reimplementation of the Makefile patch that
fetched the the tarball from their site for users outside of the US
(originally in Makefile rev 1.29). USA_RESIDENT=YES still supports
manual fetching from web.mit.edu. |
1.2.5 02 May 2002 14:30:24 |
cy |
Upgrade 1.2.4 --> 1.2.5 |
1.2.4 29 Mar 2002 13:23:08 |
cy |
www.crypto-publish.org does not have krb5-1.2.4.{tar,tar.Z,tar.gz,tar.bz2}.
Reported by: bento |
1.2.4 18 Mar 2002 22:52:43 |
cy |
MIT currently distributes their KRB5 distribution in a tarball (.tar)
that contains the distribution itself, in a tar.gz file, and a signature
certificate, contained in a detached .tar.gz.asc file. Prior to this
patch, users installing MIT KRB5 had to extract the tarball into
/usr/ports/distfiles, then proceed with the installation. This caused
confusion among those installing the port. This patch addresses the
problem by extracting the .tar.gz file from the tarball, then unpacking
the .tar.gz file before continuing with the build. |
01 Mar 2002 13:23:47 |
cy |
Update 1.2.3 --> 1.2.4 |