From owner-svn-ports-head@freebsd.org Fri Jul 22 00:24:36 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 50CAABA075F; Fri, 22 Jul 2016 00:24:36 +0000 (UTC) (envelope-from cy@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1ABFA19B6; Fri, 22 Jul 2016 00:24:36 +0000 (UTC) (envelope-from cy@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u6M0OZqI014205; Fri, 22 Jul 2016 00:24:35 GMT (envelope-from cy@FreeBSD.org) Received: (from cy@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u6M0OZmd014203; Fri, 22 Jul 2016 00:24:35 GMT (envelope-from cy@FreeBSD.org) Message-Id: <201607220024.u6M0OZmd014203@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: cy set sender to cy@FreeBSD.org using -f From: Cy Schubert Date: Fri, 22 Jul 2016 00:24:35 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r418903 - head/security/krb5-114 X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Jul 2016 00:24:36 -0000 Author: cy Date: Fri Jul 22 00:24:34 2016 New Revision: 418903 URL: https://svnweb.freebsd.org/changeset/ports/418903 Log: Update to 1.14.3. This is a bug fix release. * Improve some error messages * Improve documentation * Allow a principal with nonexistent policy to bypass the minimum password lifetime check, consistent with other aspects of nonexistent policies * Fix a rare KDC denial of service vulnerability when anonymous client principals are restricted to obtaining TGTs only [CVE-2016-3120] MFH: 2016Q3 Security: 62d45229-4fa0-11e6-9d13-206a8a720317 Security: CVE-2016-3120 Modified: head/security/krb5-114/Makefile head/security/krb5-114/distinfo Modified: head/security/krb5-114/Makefile ============================================================================== --- head/security/krb5-114/Makefile Fri Jul 22 00:22:18 2016 (r418902) +++ head/security/krb5-114/Makefile Fri Jul 22 00:24:34 2016 (r418903) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= krb5 -PORTVERSION= 1.14.2 +PORTVERSION= 1.14.3 CATEGORIES= security MASTER_SITES= http://web.mit.edu/kerberos/dist/${PORTNAME}/${PORTVERSION:C/^[0-9]*\.[0-9]*/&X/:C/X\.[0-9]*$//:C/X//}/ .if !defined(MASTERDIR) Modified: head/security/krb5-114/distinfo ============================================================================== --- head/security/krb5-114/distinfo Fri Jul 22 00:22:18 2016 (r418902) +++ head/security/krb5-114/distinfo Fri Jul 22 00:24:34 2016 (r418903) @@ -1,2 +1,3 @@ -SHA256 (krb5-1.14.2.tar.gz) = 6bcad7e6778d1965e4ce4af21d2efdc15b274c5ce5c69031c58e4c954cda8b27 -SIZE (krb5-1.14.2.tar.gz) = 12264762 +TIMESTAMP = 1469146014 +SHA256 (krb5-1.14.3.tar.gz) = cd4620d520cf0df0dd8791309912df2bb20fcba76790b9fba4e25c1da08ff2c9 +SIZE (krb5-1.14.3.tar.gz) = 12279888