notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

non port: security/krb5-119/distinfo

Number of commits found: 7

Tuesday, 16 Apr 2024
19:56 Rene Ladan (rene) search for other commits by this committer
security/krb5-119: Remove expired port

2024-04-15 security/krb5-119: Desupported by MIT following 1.21
commit hash: 4c14a7fa70629b81b8a3b3647b7d6dc9243facd3 commit hash: 4c14a7fa70629b81b8a3b3647b7d6dc9243facd3 commit hash: 4c14a7fa70629b81b8a3b3647b7d6dc9243facd3 commit hash: 4c14a7fa70629b81b8a3b3647b7d6dc9243facd3 4c14a7fa
Tuesday, 15 Nov 2022
17:19 Cy Schubert (cy) search for other commits by this committer
security/krb5-119: Update to 1.19.4

MFH:		2022Q4
Security:	CVE-2022-42898
commit hash: eed9a797cd42e81b9e21dc6b51af826836e9cc79 commit hash: eed9a797cd42e81b9e21dc6b51af826836e9cc79 commit hash: eed9a797cd42e81b9e21dc6b51af826836e9cc79 commit hash: eed9a797cd42e81b9e21dc6b51af826836e9cc79 eed9a79
16:37 Cy Schubert (cy) search for other commits by this committer
security/krb5-*: Address CVE-2022-42898

Topic: Vulnerabilities in PAC parsing

CVE-2022-42898: integer overflow vulnerabilities in PAC parsing

SUMMARY
=======

Three integer overflow vulnerabilities have been discovered in the MIT
krb5 library function krb5_parse_pac().

IMPACT
======

An authenticated attacker may be able to cause a KDC or kadmind
process to crash by reading beyond the bounds of allocated memory,
creating a denial of service.  A privileged attacker may similarly be
able to cause a Kerberos or GSS application service to crash.

On a 32-bit platform, an authenticated attacker may be able to cause
heap corruption in a KDC or kadmind process, possibly leading to
remote code execution.  A privileged attacker may similarly be able to
cause heap corruption in a Kerberos or GSS application service running
on a 32-bit platform.

An attacker with the privileges of a cross-realm KDC may be able to
extract secrets from a KDC process's memory by having them copied into
the PAC of a new ticket.

AFFECTED SOFTWARE
=================

Kerberos and GSS application services using krb5-1.8 or later are
affected.  kadmind in krb5-1.8 or later is affected.  The krb5-1.20
KDC is affected.  The krb5-1.8 through krb5-1.19 KDC is affected when
using the Samba or FreeIPA KDB modules.

REFERENCES
==========

This announcement is posted at:

  https://web.mit.edu/kerberos/advisories/MITKRB5-SA-2022-001.txt

This announcement and related security advisories may be found on the
MIT Kerberos security advisory page at:

        https://web.mit.edu/kerberos/advisories/index.html

The main MIT Kerberos web page is at:

        https://web.mit.edu/kerberos/index.html

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898

MFH:		2022Q4
Security:	CVE-2022-42898
commit hash: de40003bfd697e98cdd342e253699e83e1040961 commit hash: de40003bfd697e98cdd342e253699e83e1040961 commit hash: de40003bfd697e98cdd342e253699e83e1040961 commit hash: de40003bfd697e98cdd342e253699e83e1040961 de40003
Monday, 14 Mar 2022
16:59 Cy Schubert (cy) search for other commits by this committer
security/krb5-119: Update to 1.19.3
commit hash: f47c333666d2a5d7bac087f34d4491e42900de3b commit hash: f47c333666d2a5d7bac087f34d4491e42900de3b commit hash: f47c333666d2a5d7bac087f34d4491e42900de3b commit hash: f47c333666d2a5d7bac087f34d4491e42900de3b f47c333
Monday, 26 Jul 2021
19:55 Cy Schubert (cy) search for other commits by this committer
security/krb5-119: Update to 1.19.2

The announcement as follows:

The MIT Kerberos Team announces the availability of MIT Kerberos 5
Releases 1.19.2 and 1.18.4.  Please see below for a list of some major
changes included, or consult the README file in the source tree for a
more detailed list of significant changes.

Retrieving krb5-1.19.2 and krb5-1.18.4
======================================

You may retrieve the krb5-1.19.2 and krb5-1.18.4 sources from the
following URL:

        https://kerberos.org/dist/

The homepage for the krb5-1.19.2 and krb5-1.18.4 releases are:

        https://web.mit.edu/kerberos/krb5-1.19/
        https://web.mit.edu/kerberos/krb5-1.18/

Further information about Kerberos 5 may be found at the following
URL:

        https://web.mit.edu/kerberos/

Triple-DES transition
=====================

Beginning with the krb5-1.19 release, a warning will be issued if
initial credentials are acquired using the des3-cbc-sha1 encryption
type.  In future releases, this encryption type will be disabled by
default and eventually removed.

Beginning with the krb5-1.18 release, single-DES encryption types have
been removed.

Major changes in 1.19.2 and 1.18.4 (2021-07-22)
===============================================

These are bug fix releases.

* Fix a denial of service attack against the KDC encrypted challenge
  code [CVE-2021-36222].

* Fix a memory leak when gss_inquire_cred() is called without a
  credential handle.

MFH:		2021Q3
Security:	CVE-2021-36222
commit hash: f6f818b90ed876c718a3b2c69cee423c9acc3431 commit hash: f6f818b90ed876c718a3b2c69cee423c9acc3431 commit hash: f6f818b90ed876c718a3b2c69cee423c9acc3431 commit hash: f6f818b90ed876c718a3b2c69cee423c9acc3431 f6f818b
Friday, 19 Feb 2021
15:31 cy search for other commits by this committer
security/krb5: update 1.19 --> 1.19.1.
Original commitRevision:566076 
Tuesday, 2 Feb 2021
05:01 cy search for other commits by this committer
Welcome the new KRB5 1.19 (krb5-119)

In addition, deprecate krb5-117 to retire one year after the release
of krb5-119: Feb 1, 2022.

krb5-119 becomes the default krb5 port.
Original commitRevision:563782 

Number of commits found: 7