./security/mit-krb5, MIT Kerberos 5 authentication system

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2017Q3, Version: 1.14.6, Package name: mit-krb5-1.14.6, Maintainer: tez

Kerberos V5 is an authentication system developed at MIT. It is a network
authentication protocol designed to provide strong authentication for
client/server applications by using secret-key cryptography. (Kerberos
5 is discussed in RFC 1510.)

This package provides Kerberos and GSSAPI (Generic Security Services
Application Programming Interface) development headers and libraries.
It also includes Kerberos ticket and principal tools.

N.B. Kerberized r-services, telnet and ftp services are now found in
the security/mit-krb5-appl package.


Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: ea7928a3368ae6d8ecf29a70f70598091f226740
RMD160: 7e9f8192845d11108a3c48dd707d7d4bc5dd0a29
Filesize: 12037.456 KB

Version history: (Expand)


CVS history: (Expand)


   2017-10-15 14:06:58 by S.P.Zeidler | Files touched by this commit (3) | Package updated
Log message:
Pullup ticket #5569 - requested by sevan
security/mit-krb5: security update

Revisions pulled up:
- security/mit-krb5/Makefile                                    1.95
- security/mit-krb5/distinfo                                    1.62
- security/mit-krb5/patches/patch-CVE-2017-11368                deleted

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   tez
   Date:           Tue Oct 10 21:22:53 UTC 2017

   Modified Files:
           pkgsrc/security/mit-krb5: Makefile distinfo
   Removed Files:
           pkgsrc/security/mit-krb5/patches: patch-CVE-2017-11368

   Log message:
   mit-krb5: update to 1.14.6

   Major changes in 1.14.6 (2017-09-25)

   This is a bug fix release.

       Fix a KDC denial of service vulnerability caused by unset status
   strings [CVE-2017-11368]
       Preserve GSS contexts on init/accept failure [CVE-2017-11462]
       Fix kadm5 setkey operation with LDAP KDB module
       Use a ten-second timeout after successful connection for HTTPS KDC
   requests, as we do for TCP requests
       Fix client null dereference when KDC offers encrypted challenge
   without FAST

   To generate a diff of this commit:
   cvs rdiff -u -r1.94 -r1.95 pkgsrc/security/mit-krb5/Makefile
   cvs rdiff -u -r1.61 -r1.62 pkgsrc/security/mit-krb5/distinfo
   cvs rdiff -u -r1.1 -r0 pkgsrc/security/mit-krb5/patches/patch-CVE-2017-11368