From owner-cvs-all Thu Mar 20 16:54:11 2003 Delivered-To: cvs-all@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id ACCCD37B401; Thu, 20 Mar 2003 16:54:07 -0800 (PST) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2DD0D43F93; Thu, 20 Mar 2003 16:54:07 -0800 (PST) (envelope-from cy@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.12.6/8.12.6) with ESMTP id h2L0s70U083712; Thu, 20 Mar 2003 16:54:07 -0800 (PST) (envelope-from cy@repoman.freebsd.org) Received: (from cy@localhost) by repoman.freebsd.org (8.12.6/8.12.6/Submit) id h2L0s6f1083711; Thu, 20 Mar 2003 16:54:06 -0800 (PST) Message-Id: <200303210054.h2L0s6f1083711@repoman.freebsd.org> From: Cy Schubert Date: Thu, 20 Mar 2003 16:54:06 -0800 (PST) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/krb5 Makefile ports/security/krb5/files patch-appl::telnet::libtelnet::kerberos5.c patch-clients::ksu::heuristic.c patch-clients::ksu::krb_auth_su.c patch-include::krb5.hin patch-kdc::do_tgs_req.c patch-kdc::kdc_util.c patch-kdc::kdc_util.h patch-kdc::kerberos_v4.c patch-kdc::main.c ... X-FreeBSD-CVS-Branch: HEAD Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG cy 2003/03/20 16:54:06 PST FreeBSD ports repository Modified files: security/krb5 Makefile Added files: security/krb5/files patch-appl::telnet::libtelnet::kerberos5.c patch-clients::ksu::heuristic.c patch-clients::ksu::krb_auth_su.c patch-include::krb5.hin patch-kdc::do_tgs_req.c patch-kdc::kdc_util.c patch-kdc::kdc_util.h patch-kdc::kerberos_v4.c patch-kdc::main.c patch-krb524::cnv_tkt_skey.c patch-krb524::krb524d.c patch-lib::kdb::keytab.c patch-lib::krb5::keytab::file:ktf_util.c patch-lib::krb5::krb::gc_frm_kdc.c patch-lib::krb5::krb::parse.c patch-lib::krb5::krb::srv_rcache.c patch-lib::krb5::krb::unparse.c patch-lib::rpc::xdr_mem.c Log: Patches from: - MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai Revision Changes Path 1.51 +1 -0 ports/security/krb5/Makefile 1.1 +14 -0 ports/security/krb5/files/patch-appl::telnet::libtelnet::kerberos5.c (new) 1.1 +12 -0 ports/security/krb5/files/patch-clients::ksu::heuristic.c (new) 1.1 +13 -0 ports/security/krb5/files/patch-clients::ksu::krb_auth_su.c (new) 1.1 +16 -0 ports/security/krb5/files/patch-include::krb5.hin (new) 1.1 +12 -0 ports/security/krb5/files/patch-kdc::do_tgs_req.c (new) 1.1 +27 -0 ports/security/krb5/files/patch-kdc::kdc_util.c (new) 1.1 +15 -0 ports/security/krb5/files/patch-kdc::kdc_util.h (new) 1.1 +233 -0 ports/security/krb5/files/patch-kdc::kerberos_v4.c (new) 1.1 +37 -0 ports/security/krb5/files/patch-kdc::main.c (new) 1.1 +34 -0 ports/security/krb5/files/patch-krb524::cnv_tkt_skey.c (new) 1.1 +89 -0 ports/security/krb5/files/patch-krb524::krb524d.c (new) 1.1 +86 -0 ports/security/krb5/files/patch-lib::kdb::keytab.c (new) 1.1 +42 -0 ports/security/krb5/files/patch-lib::krb5::keytab::file:ktf_util.c (new) 1.1 +14 -0 ports/security/krb5/files/patch-lib::krb5::krb::gc_frm_kdc.c (new) 1.1 +29 -0 ports/security/krb5/files/patch-lib::krb5::krb::parse.c (new) 1.1 +12 -0 ports/security/krb5/files/patch-lib::krb5::krb::srv_rcache.c (new) 1.1 +17 -0 ports/security/krb5/files/patch-lib::krb5::krb::unparse.c (new) 1.1 +136 -0 ports/security/krb5/files/patch-lib::rpc::xdr_mem.c (new) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message