| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
- incorporate fix for MITKRB5-SA-2014-001 (CVE-2014-4345)
|
|
|
|
|
| |
- gssapi: pull in upstream fix for a possible NULL dereference
in spnego (CVE-2014-4344)
|
|
|
|
|
| |
Update to the as-committed version of this patch, which affects the
comments it includes.
|
|
|
|
|
| |
- gssapi: pull in proposed fix for a double free in initiators (David
Woodhouse, #1117963)
|
| |
|
|
|
|
|
| |
- pull in fix for denial of service by injection of malformed GSSAPI
tokens (CVE-2014-4341, CVE-2014-4342, #1116181)
|
|
|
|
|
| |
- pull in changes from upstream which add processing of the contents of
/etc/gss/mech.d/*.conf when loading GSS modules (#1102839)
|
|
|
|
| |
- pull in fix for building against tcl 8.6 (#1107061)
|
|
|
|
|
|
| |
We were having trouble building the PDFs due to a missing pdfcolor.tex
after the latest update to python-sphinx, but an even newer
texlive-pdftex provides that, so add it as a BuildRequires:
|
| |
|
| |
|
|
|
|
|
|
|
| |
- spnego: pull in patch from master to restore preserving the OID of the
mechanism the initiator requested when we have multiple OIDs for the
same mechanism, so that we reply using the same mechanism OID and the
initiator doesn't get confused (#1066000, RT#7858)
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
- pull in patch from master to move the default directory which the KDC
uses when computing the socket path for a local OTP daemon from the
database directory (/var/kerberos/krb5kdc) to the newly-added run
directory (/run/krb5kdc), in line with what we're expecting in 1.13
(RT#7859)
- add a tmpfiles.d configuration file to have /run/krb5kdc created at
boot-time
- own /var/run/krb5kdc
|
|
|
|
| |
... as referenced by 9b18d26ce3864e6d502b76e1151f1dfc92569650
|
|
|
|
| |
... and add our local patch to fix the bind-then-connect case.
|
| |
|
| |
|
|
|
|
|
| |
- add currently-proposed changes to teach ksu about credential cache
collections and the default_ccache_name setting (#1015559,#1026099)
|
|
|
|
|
|
| |
- pull in multiple changes to allow replay caches to be added to a GSS
credential store as "rcache"-type credentials (RT#7818/#7819/#7836,
#1056078/#1056080)
|
| |
|
| |
|
|
|
|
|
|
| |
add patch to always retrieve the KDC time offsets from keyring caches,
so that we don't mistakenly interpret creds as expired before their
time when our clock is ahead of the KDC's (RT#7820, #1030607)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
- update the PIC patch for iaesx86.s to not use ELF relocations
(RT#7815, #1045699) to the version that landed upstream
|
| |
|
|
|
|
|
| |
- pass -Wl,--warn-shared-textrel to the compiler when we're creating shared
libraries
|
| |
|
|
|
|
|
| |
- amend the PIC patch for iaesx86.s to also save/restore ebx in the
functions where we modify it
|
|
|
|
|
|
| |
- make a guess at making the 32-bit AES-NI implementation sufficiently
position-independent to not require execmod permissions for libk5crypto
(more of #1045699)
|
|
|
|
|
| |
- grab a more-commented version of the most recent patch from upstream
master
|
|
|
|
|
|
| |
- add patch from Dhiru Kholia for the AES-NI implementations to allow
libk5crypto to be properly marked as not needing an executable stack
on arches where they're used (#1045699, and so many others)
|
|
|
|
| |
Go back to not using AES-NI, until we sort out execstack (#1045699).
|
|
|
|
|
| |
- add yasm as a build requirement for AES-NI support, on arches that have
yasm and AES-NI
|
|
|
|
|
| |
- pull in fix from master to make reporting of errors encountered by the
SPNEGO mechanism work better (RT#7045, part of #1043962)
|
|
|
|
|
| |
- update a test wrapper to properly handle things that the new libkrad does,
and add python-pyrad as a build requirement so that we can run its tests
|
| |
|
|
|
|
| |
- backport fixes to krb5_copy_context (RT#7807, #1044735/#1044739)
|
|
|
|
|
|
| |
- pull in fix from master to avoid a memory leak in a couple of error
cases which could occur while obtaining acceptor credentials (RT#7805, part
of #1043962)
|
|
|
|
|
| |
- pull in fix from master to avoid a memory leak when a mechanism's
init_sec_context function fails (RT#7803, part of #1043962)
|
|
|
|
|
| |
- pull in fix from master to ignore an empty token from an acceptor if
we've already finished authenticating (RT#7797, part of #1043962)
|
|
|
|
|
|
| |
- pull in fix from master to return a NULL pointer rather than allocating
zero bytes of memory if we read a zero-length input token (RT#7794, part of
#1043962)
|
| |
|
| |
|