head 1.4; access; symbols pkgsrc-2013Q2:1.4.0.36 pkgsrc-2013Q2-base:1.4 pkgsrc-2012Q4:1.4.0.34 pkgsrc-2012Q4-base:1.4 pkgsrc-2011Q4:1.4.0.32 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q2:1.4.0.30 pkgsrc-2011Q2-base:1.4 pkgsrc-2009Q4:1.4.0.28 pkgsrc-2009Q4-base:1.4 pkgsrc-2008Q4:1.4.0.26 pkgsrc-2008Q4-base:1.4 pkgsrc-2008Q3:1.4.0.24 pkgsrc-2008Q3-base:1.4 cube-native-xorg:1.4.0.22 cube-native-xorg-base:1.4 pkgsrc-2008Q2:1.4.0.20 pkgsrc-2008Q2-base:1.4 pkgsrc-2008Q1:1.4.0.18 pkgsrc-2008Q1-base:1.4 pkgsrc-2007Q4:1.4.0.16 pkgsrc-2007Q4-base:1.4 pkgsrc-2007Q3:1.4.0.14 pkgsrc-2007Q3-base:1.4 pkgsrc-2007Q2:1.4.0.12 pkgsrc-2007Q2-base:1.4 pkgsrc-2007Q1:1.4.0.10 pkgsrc-2007Q1-base:1.4 pkgsrc-2006Q4:1.4.0.8 pkgsrc-2006Q4-base:1.4 pkgsrc-2006Q3:1.4.0.6 pkgsrc-2006Q3-base:1.4 pkgsrc-2006Q2:1.4.0.4 pkgsrc-2006Q2-base:1.4 pkgsrc-2006Q1:1.4.0.2 pkgsrc-2006Q1-base:1.4 pkgsrc-2005Q4:1.3.0.2 pkgsrc-2005Q4-base:1.3 pkgsrc-2005Q3:1.2.0.12 pkgsrc-2005Q3-base:1.2 pkgsrc-2005Q2:1.2.0.10 pkgsrc-2005Q2-base:1.2 pkgsrc-2005Q1:1.2.0.8 pkgsrc-2005Q1-base:1.2 pkgsrc-2004Q4:1.2.0.6 pkgsrc-2004Q4-base:1.2 pkgsrc-2004Q3:1.2.0.4 pkgsrc-2004Q3-base:1.2 pkgsrc-2004Q2:1.2.0.2 pkgsrc-2004Q2-base:1.2 pkgsrc-2004Q1:1.1.0.2 pkgsrc-2004Q1-base:1.1; locks; strict; comment @# @; 1.4 date 2006.02.07.12.20.52; author lha; state dead; branches; next 1.3; 1.3 date 2005.10.26.16.44.24; author jlam; state Exp; branches 1.3.2.1; next 1.2; 1.2 date 2004.04.01.18.42.25; author joda; state dead; branches; next 1.1; 1.1 date 2004.02.22.11.59.50; author markd; state Exp; branches; next ; 1.3.2.1 date 2006.02.08.15.59.35; author salo; state dead; branches; next ; desc @@ 1.4 log @http://www.pdc.kth.se/heimdal/releases/0.7.2/ http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ Changes in Heimdal 0.7.2 * Fix security problem in rshd that enable an attacker to overwrite and change ownership of any file that root could write. * Fix a DOS in telnetd. The attacker could force the server to crash in a NULL de-reference before the user logged in, resulting in inetd turning telnetd off because it forked too fast. * Make gss_acquire_cred(GSS_C_ACCEPT) check that the requested name exists in the keytab before returning success. This allows servers to check if its even possible to use GSSAPI. * Fix receiving end of token delegation for GSS-API. It still wrongly uses subkey for sending for compatibility reasons, this will change in 0.8. * telnetd, login and rshd are now more verbose in logging failed and successful logins. * Bug fixes @ text @$NetBSD: patch-ag,v 1.3 2005/10/26 16:44:24 jlam Exp $ --- lib/krb5/krb5.h.orig 2005-09-09 08:12:13.000000000 -0400 +++ lib/krb5/krb5.h @@@@ -657,7 +657,7 @@@@ typedef struct _krb5_get_init_creds_opt krb5_preauthtype *preauth_list; int preauth_list_length; krb5_data *salt; - struct _krb5_get_init_creds_opt_private *private; + struct _krb5_get_init_creds_opt_private *opt_private; } krb5_get_init_creds_opt; #define KRB5_GET_INIT_CREDS_OPT_TKT_LIFE 0x0001 @ 1.3 log @Pull in change from Heimdal CVS committed on 20051012 where the field in a publicly-exported structure was renamed from "private" to "opt_private". This allows to be used by C++ compilers. Bump the PKGREVISION to 1. @ text @d1 1 a1 1 $NetBSD$ @ 1.3.2.1 log @Pullup ticket 1106 - requested by Love Hornquist Astrand security update for heimdal Revisions pulled up: - pkgsrc/security/heimdal/Makefile 1.54 - pkgsrc/security/heimdal/distinfo 1.19 - pkgsrc/security/heimdal/patches/patch-ab removed - pkgsrc/security/heimdal/patches/patch-ak removed - pkgsrc/security/heimdal/patches/patch-ae removed - pkgsrc/security/heimdal/patches/patch-af removed - pkgsrc/security/heimdal/patches/patch-ag removed - pkgsrc/security/heimdal/patches/patch-ah removed - pkgsrc/security/heimdal/patches/patch-ai removed - pkgsrc/security/heimdal/patches/patch-aj removed Module Name: pkgsrc Committed By: lha Date: Tue Feb 7 12:20:52 UTC 2006 Modified Files: pkgsrc/security/heimdal: Makefile distinfo Removed Files: pkgsrc/security/heimdal/patches: patch-ab patch-ae patch-af patch-ag patch-ah patch-ai patch-aj patch-ak Log Message: http://www.pdc.kth.se/heimdal/releases/0.7.2/ http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ Changes in Heimdal 0.7.2 * Fix security problem in rshd that enable an attacker to overwrite and change ownership of any file that root could write. * Fix a DOS in telnetd. The attacker could force the server to crash in a NULL de-reference before the user logged in, resulting in inetd turning telnetd off because it forked too fast. * Make gss_acquire_cred(GSS_C_ACCEPT) check that the requested name exists in the keytab before returning success. This allows servers to check if its even possible to use GSSAPI. * Fix receiving end of token delegation for GSS-API. It still wrongly uses subkey for sending for compatibility reasons, this will change in 0.8. * telnetd, login and rshd are now more verbose in logging failed and successful logins. * Bug fixes @ text @d1 1 a1 1 $NetBSD: patch-ag,v 1.3 2005/10/26 16:44:24 jlam Exp $ @ 1.2 log @Update to 0.6.1: * Fixed cross realm vulnerability * Fixed ARCFOUR suppport * kdc: fix denial of service attack * kdc: stop clients from renewing tickets into the future * bug fixes @ text @d1 1 a1 1 $NetBSD: patch-ag,v 1.1 2004/02/22 11:59:50 markd Exp $ d3 11 a13 14 --- lib/roken/ndbm_wrap.c.orig 2002-05-01 04:37:08.000000000 +1200 +++ lib/roken/ndbm_wrap.c @@@@ -165,7 +165,11 @@@@ dbm_open (const char *file, int flags, m free(fn); return NULL; } +#if defined(HAVE_DB4_DB_H) + if(db->open(db, NULL, fn, NULL, DB_BTREE, myflags, mode) != 0) { +#else if(db->open(db, fn, NULL, DB_BTREE, myflags, mode) != 0) { +#endif free(fn); db->close(db, 0); return NULL; @ 1.1 log @configure looks for and finds -ltermcap too late in the process for it to be linked in when testing -lreadline usability so that test fails on Solaris - so pass that lib into configure at the start via the environment. Also allow optional use of db4 rather that db. @ text @d1 1 a1 1 $NetBSD$ @