aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-01-13pull up r20611 from trunkkrb5-1.6Tom Yu1-1/+1
------------------------------------------------------------------------ r20611 | raeburn | 2008-08-06 11:51:48 -0400 (Wed, 06 Aug 2008) | 7 lines ticket: new subject: bad free in kprop target_version: 1.6.4 tags: pullup Don't free automatic storage after sending database. ticket: 6065 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@23656 dc483132-0cff-0310-8789-dd5450dbe970
2010-01-12MITKRB5-SA-2009-004 [CVE-2009-4212] integer underflow in AES and RC4 decryptionTom Yu7-7/+152
Fix integer underflow in AES and RC4 decryption. [MITKRB5-SA-2009-004, CVE-2009-4212] ticket: 6638 target_version: 1.6.4 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@23653 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-23back to krb5-1.6.4-beta1-postreleaseTom Yu1-2/+2
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22454 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-23patchlevel for kfw-3.2.3-alpha1Tom Yu1-2/+2
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22452 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-23set eol-style propertiesTom Yu1-1890/+1890
ticket: 6535 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22450 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-23Add files omitted from previous commit. (r22445) Revert accidentalTom Yu5-3/+1925
commit of default option values in BKWconfig.xml. ticket: 6535 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22449 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-22back to 1.6.4-beta1-postreleaseTom Yu1-2/+2
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22447 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-22jumbo pullup for kfw-3.2.3-alpha1Tom Yu25-937/+1041
This is a jumbo pullup of multiple KfW-related changes. The are primarily build system fixes, including changes to enable building on amd64. Included are some changes from branches/kpkoch-ccapi that have not yet been merged to the trunk. Relevant RT ticket numbers include: 5817 5819 6007 ticket: 6535 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22445 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-17ticket; 6531Tom Yu1-0/+4
version_fixed: 1.6.4 pull up r22443 from trunk ------------------------------------------------------------------------ r22443 | tlyu | 2009-07-16 21:35:58 -0400 (Thu, 16 Jul 2009) | 8 lines ticket: 6531 target_version: 1.6.4 tags: pullup subject: include win-mac.h in gssftp/ftp/cmds.c for HAVE_STDLIB_H gssftp/ftp/cmds.c had a preprocessor conditional on HAVE_STDLIB_H that will not evaluate correctly on WIN32 unless win-mac.h is included first. git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22444 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-16pull up r20479 from trunk. The ticket numbers don't match becauseTom Yu1-1/+3
reported on the 1.6 branch. ------------------------------------------------------------------------ r20479 | raeburn | 2008-06-26 20:31:59 -0400 (Thu, 26 Jun 2008) | 8 lines ticket: 5925 status: open Don't do FD_SETSIZE check on Windows. Also, for form's sake, use closesocket instead of close inside the check. Kevin or Jeff, could you please verify that the code works again? ticket: 6433 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22442 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-09pull up r20608 from trunkTom Yu1-2/+2
------------------------------------------------------------------------ r20608 | raeburn | 2008-08-05 20:05:47 -0400 (Tue, 05 Aug 2008) | 9 lines ticket: new subject: fix cleanup code in allocating preauth info target_version: 1.6.4 tags: pullup After an allocation failure, free up the previously allocated array elements by counting back down to zero, not continuing to count up until we hit zero. ticket: 6064 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22429 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-09pull up r20580 from trunkTom Yu1-0/+1
------------------------------------------------------------------------ r20580 | raeburn | 2008-07-25 15:19:06 -0400 (Fri, 25 Jul 2008) | 8 lines ticket: new target_version: 1.6.4 tags: pullup subject: fix possible uninit variable use in error path Clear gss_client and gss_target before any possible branch to 'error', where they can be used. ticket: 6053 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22428 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-09pull up r20485 from trunkTom Yu4-6/+4
------------------------------------------------------------------------ r20485 | raeburn | 2008-06-26 23:33:14 -0400 (Thu, 26 Jun 2008) | 8 lines ticket: new target_version: 1.6.4 tags: pullup subject: use-after-free bugs Fix some bugs with storage being used immediately after being freed. None look like anything an attacker can really manipulate AFAICT. ticket: 5998 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22427 dc483132-0cff-0310-8789-dd5450dbe970
2009-07-09pull up r20482, r20481 from trunkTom Yu11-17/+40
------------------------------------------------------------------------ r20482 | raeburn | 2008-06-26 22:51:09 -0400 (Thu, 26 Jun 2008) | 5 lines ticket: 5997 Memory leak, and possible freed-memory dereference, in an error (small allocation failure) path. ------------------------------------------------------------------------ r20481 | raeburn | 2008-06-26 22:47:06 -0400 (Thu, 26 Jun 2008) | 9 lines ticket: new target_version: 1.6.4 subject: misc memory leaks tags: pullup Fix various memory leaks that show up mostly in error cases (e.g., failure to allocate one small object, and then we forget to free another one). ticket: 5997 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22426 dc483132-0cff-0310-8789-dd5450dbe970
2009-04-08CVE-2009-0846 (1.6.x) asn1_decode_generaltime can free uninitialized pointerTom Yu2-0/+17
pull up rxxxx from trunk The asn1_decode_generaltime() function can free an uninitialized pointer if asn1buf_remove_charstring() fails. ticket: 6448 tags: pullup target_version: 1.6.4 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22181 dc483132-0cff-0310-8789-dd5450dbe970
2009-04-08CVE-2009-0847 (1.6.x) asn1buf_imbed incorrect length validatinTom Yu1-2/+4
pull up rxxxx from trunk asn1buf_imbed() can perform pointer arithmetic that causes the "bound" pointer of the subbuffer to be less than the "next" pointer. This can lead to malloc() failure or crash. In asn1buf_imbed(), check the length before doing arithmetic to set subbuf->bound. In asn1buf_remove_octetstring() and asn1buf_remove_charstring(), check for invalid buffer pointers before executing an unsigned length check against a (casted to size_t) negative number. ticket: 6447 tags: pullup target_version: 1.6.4 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22180 dc483132-0cff-0310-8789-dd5450dbe970
2009-04-08CVE-2009-0844 (1.6.x) SPNEGO can read beyond buffer endTom Yu1-25/+22
pull up rxxxxx from trunk SPNEGO can read beyond the end of a buffer if the claimed DER length exceeds the number of bytes in the input buffer. This can lead to crash or information disclosure. Thanks to Apple for reporting this vulnerability and providing patches. ticket: 6446 tags: pullup target_version: 1.6.4 version_fixd: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22179 dc483132-0cff-0310-8789-dd5450dbe970
2009-04-08Apply revised patch from Apple that ensures that a REJECT token isTom Yu1-3/+5
sent on error. ticket: 6426 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22178 dc483132-0cff-0310-8789-dd5450dbe970
2009-03-17CVE-2009-0845 (1.6.x) SPNEGO can dereference a null pointerTom Yu1-1/+2
pull up r22084 from trunk acc_ctx_new() can return an error condition without establishing a SPNEGO context structure. This can cause a null pointer dereference in cleanup code in spnego_gss_accept_sec_context(). ticket: 6426 tags: pullup target_version: 1.6.4 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22104 dc483132-0cff-0310-8789-dd5450dbe970
2008-08-11pull up r20573 from trunkTom Yu1-1/+1
r20573@cathode-dark-space: jaltman | 2008-07-23 11:09:15 -0400 ticket: 6047 tags: pullup The NIM error reporting functions (in src/windows/identity/kherr ) keep track of the the error message with the highest severity level that was reported for a specific error reporting context. However, if another error message of the same severity is reported, the error message being tracked will be updated to be the newly received error. The user will often only be notified of the error message that was tracked for a specific operation. Therefore, tracking the last message with the highest priority has the unfortunate side-effect of not reporting the cause of a failure. This patch changes the condition for updating the tracked error message to be the first message with the highest severity. ticket: 6047 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20641 dc483132-0cff-0310-8789-dd5450dbe970
2008-08-11pull up r20572 from trunkTom Yu4-8/+64
r20572@cathode-dark-space: jaltman | 2008-07-23 11:04:26 -0400 ticket: 5745 tags: pullup This patch modifies the NIM Kerberos v5 plug-in to use the krb5_get_error_message() function to look up the error string if the call to krb5_get_init_creds_password() fails. If the call to krb5_get_error_message() fails, the caller will failover to the previous method of looking up a suitable error message based on the error code. ticket: 5745 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20640 dc483132-0cff-0310-8789-dd5450dbe970
2008-08-11pull up r20571 from trunkTom Yu2-0/+9
r20571@cathode-dark-space: jaltman | 2008-07-23 10:44:50 -0400 ticket: 6046 tags: pullup The /src/windows/identity/plugins/common/dynimport.{c,h} files are used by the NIM Kerberos v5 plug-ins for run-time dynamic linking. They currently do not declare or import the following functions: krb5_get_error_message() krb5_free_error_message() krb5_clear_error_message() This patch adds declarations and definitions required for locating these functions. Relies on the addition of these functions to the prototype list in the Pismere loadfuncs-krb5.h. See ticket 6045. ticket: 6046 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20639 dc483132-0cff-0310-8789-dd5450dbe970
2008-08-11pull up r20570 from trunkTom Yu1-6/+2
r20570@cathode-dark-space: jaltman | 2008-07-23 10:38:27 -0400 ticket: 5605 tags: pullup cw_handle_header_msg(): The behavior of the HDN_ENDTRACK notification has changed slightly on Vista. HDM_GETITEMRECT, when used while handling HDN_ENDTRACK, returns the item extents that were there prior to the user starting the resizing operation. Earlier it would return the extents that resulted from the resizing operation. This resulted in a visual update problem on Windows Vista/2008 in the NIM Advanced View. ticket: 5605 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20638 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20478 from trunkTom Yu1-1/+1
r20478@cathode-dark-space: raeburn | 2008-06-26 20:22:43 -0400 ticket: new target_version: 1.6.4 Fix off-by-one error in range check on file descriptor number. ticket: 5995 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20587 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20127 from trunkTom Yu2-0/+22
r20127@cathode-dark-space: raeburn | 2007-10-17 20:14:01 -0400 Reject socket fds > FD_SETSIZE. ticket: 5995 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20586 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20553 from trunkTom Yu1-7/+7
r20553@cathode-dark-space: jaltman | 2008-07-21 14:48:03 -0400 ticket: new subject: Assign fixed ordinals to comerr32.dll exports component: krb5-libs tags: pullup All of the other libraries on Windows have fixed assignments of ordinals to the exported functions. Assign the ordinals that were in use in the last public release, kfw 3.2.2, so that they will remain constant into the future in case additional exports are added to the library. ticket: 6040 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20585 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20558 from trunkTom Yu1-1/+2
r20558@cathode-dark-space: jaltman | 2008-07-21 16:33:53 -0400 ticket: 5840 tags: pullup kadm5_decrypt_key(). This patch prevents the returned keyblock's enctype from being coerced to the requested 'ktype' if the requested 'ktype' == -1. A ktype of -1 is documented as meaning "to be ignored". ticket: 5840 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20584 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25 r20575@cathode-dark-space: tlyu | 2008-07-23 13:06:56 -0400Tom Yu1-1/+1
ticket: 5442 Fix one missed rename of "exit" label to "done". ticket: 5442 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20583 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20574 from trunkTom Yu1-4/+4
r20574@cathode-dark-space: jaltman | 2008-07-23 12:03:40 -0400 ticket: 5442 replace "exit" label with "done" ticket: 5442 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20582 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-25pull up r20559 from trunkTom Yu1-17/+18
r20559@cathode-dark-space: jaltman | 2008-07-21 16:47:35 -0400 ticket: 5442 tags: pullup This patch addresses the issues raised in this ticket and ticket 5936. (a) In the case where 'cred_handle' != 'verifier_cred_handle'[1] krb5_gss_accept_sec_context() leaks the 'cred_handle' in the success case and the failure cases that result in returning from the function prior to reaching the end of the function. (b) The meaningful 'minor_status' return value is destroyed during the cleanup operations. The approach taken is to add a new 'exit:' label prior to the end of the function through which all function returns after reaching the 'fail:' label will goto. After 'exit:', the 'cred_handle' will be released and if there is a krb5_context 'context' to be freed, the error info will be saved and krb5_free_context() will be called. In the success case, the krb5_context is saved in the gss context and we now set 'context' to NULL to prevent it from being freed. In order to preserve the minor_status return code, a 'tmp_minor_status' variable is added that is used after the 'fail:' label in calls to krb5_gss_delete_sec_context() and krb5_gss_release_cred(). [1] If 'verifier_cred_handle' is non-NULL, then 'cred_handle' is set to the value of 'verifier_cred_handle'. ticket: 5442 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20581 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20561 from trunkTom Yu1-11/+19
(includes unrelated cleanup of dead assignment) r20561@cathode-dark-space: raeburn | 2008-07-21 16:59:24 -0400 ticket: 5980 Another check for null return from krb5_cc_default_name. ticket: 5980 version_fixed: 1.6.4 status: resolved git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20565 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20551 from trunkTom Yu1-2/+4
r20551@cathode-dark-space: jaltman | 2008-07-21 13:44:43 -0400 ticket: 5080 tags: pullup ccdefault.c: krb5_cc_default_name() is permitted to return a NULL pointer as a valid output. Passing a NULL pointer to strcmp() will result in an exception as NULL is not a valid input parameter to strcmp(). Save the output of krb5_cc_default_name() to a variable and modify the conditional to set the new default ccache name in the case where there is no existing default ccache name. ticket: 5980 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20564 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20557 from trunkTom Yu1-1/+1
r20557@cathode-dark-space: jaltman | 2008-07-21 16:30:44 -0400 ticket: 5839 tags: pullup krb5_string_to_keysalts() Fix an infinite loop in the parsing of 'kp' ticket: 5839 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20563 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20555 from trunkTom Yu1-0/+13
r20555@cathode-dark-space: jaltman | 2008-07-21 15:43:21 -0400 ticket: 5895 tags: pullup There are two mutex locking issues that Roland Dowdeswell noticed in the memory ccache. The first one is in cc_memory.c:krb5_mcc_initialize(). When it is free(3)ing the existing credentials it does not lock the data structures and hence two separate threads can run into issues. The same problem exists in cc_memory.c:krb5_mcc_destroy(). ticket: 5895 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20562 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20527 from trunkTom Yu1-0/+1
r20527@cathode-dark-space: tlyu | 2008-07-15 17:43:35 -0400 ticket: new subject: krb5_get_cred_via_tkt() should null out_cred on errors tags: pullup target_version: 1.6.4 component: krb5-libs Helper function krb5_kdcrep2creds(), called from krb5_get_cred_via_tkt(), should null its output pointer after freeing allocated memory, to avoid returning an invalid pointer. ticket: 6033 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20550 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20532 from trunkTom Yu10-162/+149
r20532@cathode-dark-space: tlyu | 2008-07-17 11:44:43 -0400 ticket: 6030 tags: pullup target_version: 1.6.4 Apply patch from Mark Phalan to correctly use progname instead of argv[0]. ticket: 6030 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20549 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20531 from trunkTom Yu2-6/+11
r20531@cathode-dark-space: tlyu | 2008-07-16 19:01:54 -0400 ticket: 6028 target_version: 1.6.4 tags: pullup Apply patch from Mark Phalan to initialize progname before use. ticket: 6028 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20548 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-21pull up r20536 from trunkTom Yu1-1/+2
r20536@cathode-dark-space: tlyu | 2008-07-17 19:40:32 -0400 ticket: 6018 target_version: 1.6.4 tags: pullup In krb5_rc_io_creat(), unlink any existing rcache file before trying to create a new rcache. This allows better recovery from corrupt rcache files. ticket: 6018 status: resolved version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20547 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20503 from trunkTom Yu1-0/+26
r20503@cathode-dark-space: tlyu | 2008-07-09 15:54:56 -0400 ticket: new tags: pullup component: krb5-libs subject: add copyright to lib/crypto/enc_provider/aes.c target_version: 1.6.4 lib/crypto/enc_provider/aes.c was missing a copyright statement. Added. ticket: 6022 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20524 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20480 from trunkTom Yu1-4/+4
r20480@cathode-dark-space: raeburn | 2008-06-26 21:26:08 -0400 ticket: new subject: fix free of automatic storage target_version: 1.6.4 tags: pullup Fix a possible free of automatic storage that can happen on an (unlikely) encoding failure. ticket: 5996 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20523 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20477 from trunkTom Yu1-6/+13
r20477@cathode-dark-space: raeburn | 2008-06-26 20:20:33 -0400 ticket: new target_version: 1.6.4 Fix possible null pointer deref, possible uninit ptr use, possible leak in unlikely small-allocation failure case. ticket: 5994 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20522 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20304 from trunkTom Yu1-2/+3
r20304@cathode-dark-space: raeburn | 2008-04-18 15:31:47 -0400 ticket: new subject: fix possible buffer overrun in handling generic-error return target_version: 1.6.5 tags: pullup Jeff Altman reported this, based on a crash seen in KfW in the wild. The krb5_data handle used to describe the message field returned by the KDC is not null-terminated, but we use a "%s" format to incorporate it into an error message string. In the right circumstances, garbage bytes can be pulled into the string, or a memory fault may result. However, as this is in the error-reporting part of the client-side code for fetching new credentials, it's a relatively minor DoS attack only, not a serious security exposure. Should be fixed in the next releases, though. ticket: 5944 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20521 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20296 from trunkTom Yu1-1/+1
r20296@cathode-dark-space: raeburn | 2008-03-28 21:09:00 -0400 ticket: new subject: Coverity CID 101: Fix minor bounds check error. target_version: 1.6.4 tags: pullup Coverity CID 101: Fix minor bounds check error. ticket: 5933 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20520 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20413 from trunkTom Yu2-2/+7
r20413@cathode-dark-space: jaltman | 2008-06-18 15:36:49 -0400 ticket: 5924 tags: pullup This patch is derived from a patch originally submitted to RT by: Nik Conwell <nik@bu.edu> krb5_set_real_time() accepts as input the time of the KDC or an application server as a combination of seconds and microseconds. Often it is the case that the time source does not provide the real time with less than one second granularity. Up until this patch such a caller would fill in the microseconds parameter as zero. krb5_set_real_time() would treat the zero microseconds as the actual reported time and compute a microsecond based offset. During a one second window subsequent calls to krb5_set_real_time() would have an ever increasing offset size until the number of seconds is incremented. This in turn produces a side effect in which the microseconds value of the local clock is effectively erased. If there are multiple processes or threads on the same machine each requesting service tickets using the same client principal for the same service principal where the number of seconds reported by the KDC are equivalent, then they will now all create authenticators with exactly the same timestamp. As a result, the authenticating service will detect a replay attack even though the authenticators are actually unique. The replay cache only maintains a tuple of client, server and timestamp. This patch modifies the interpretation of the microseconds parameter. If -1 is specified, the microseconds offset is ignored. ticket: 5924 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20519 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20509 from trunkTom Yu1-2/+5
r20509@cathode-dark-space: tlyu | 2008-07-09 22:04:03 -0400 ticket: 5632 Apply patch from Apple to handle missing krb5.conf for zeroconf situations. ticket: 5632 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20518 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20311 from trunkTom Yu1-55/+55
r20311@cathode-dark-space: rra | 2008-04-28 19:05:27 -0400 Ticket: new Subject: Properly escape - in kdb5_ldap_util man page Component: krb5-doc Version_Reported: 1.6.3 Target_Version: 1.6.4 Tags: pullup The LDAP plugin introduced a new man page which has unescaped hyphens. Unicode-aware groffs may convert those to real hyphens rather than the intended ASCII hyphen. This patch adds backslashes in front of all the bare hyphens that I plus Debian's lintian program could find to force interpretation as ASCII hyphens. ticket: 5953 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20517 dc483132-0cff-0310-8789-dd5450dbe970
2008-07-14pull up r20316 from trunkTom Yu1-2/+2
r20316@cathode-dark-space: rra | 2008-05-10 23:54:41 -0400 Ticket: 5544 Tags: pullup Fix a typo in krb5.conf: ldap_server should be ldap_servers, as the latter is what the LDAP KDB plugin looks for. ticket: 5544 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20516 dc483132-0cff-0310-8789-dd5450dbe970
2008-03-22krb5-1.6.4-beta1-postreleaseTom Yu1-2/+2
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20288 dc483132-0cff-0310-8789-dd5450dbe970
2008-03-22README and patchlevel for krb5-1.6.4-beta1Tom Yu2-10/+58
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20286 dc483132-0cff-0310-8789-dd5450dbe970
2008-03-19Apply patch for MITKRB5-SA-2008-001Tom Yu3-64/+48
ticket: 5919 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20283 dc483132-0cff-0310-8789-dd5450dbe970