File project.diff of Package krb5
--- bug-888697-CVE-2014-4343-Fix-double-free-in-SPNEGO.dif.orig
+++ bug-888697-CVE-2014-4343-Fix-double-free-in-SPNEGO.dif
@@ -53,7 +53,7 @@ diff --git a/src/lib/gssapi/spnego/spneg
index 173c6d2..8f829d8 100644
--- a/src/lib/gssapi/spnego/spnego_mech.c
+++ b/src/lib/gssapi/spnego/spnego_mech.c
-@@ -818,7 +818,6 @@ init_ctx_reselect(OM_uint32 *minor_status, spnego_gss_ctx_id_t sc,
+@@ -773,7 +773,6 @@ init_ctx_reselect(OM_uint32 *minor_status, spnego_gss_ctx_id_t sc,
OM_uint32 tmpmin;
size_t i;
--- bug-888697-CVE-2014-4344-fix-null-deref-in-SPNEGO-acceptor.dif.orig
+++ bug-888697-CVE-2014-4344-fix-null-deref-in-SPNEGO-acceptor.dif
@@ -35,7 +35,7 @@ diff --git a/src/lib/gssapi/spnego/spneg
index 8f829d8..2aa6810 100644
--- a/src/lib/gssapi/spnego/spnego_mech.c
+++ b/src/lib/gssapi/spnego/spnego_mech.c
-@@ -1468,7 +1468,7 @@ acc_ctx_cont(OM_uint32 *minstat,
+@@ -1420,7 +1420,7 @@ acc_ctx_cont(OM_uint32 *minstat,
ptr = bufstart = buf->value;
#define REMAIN (buf->length - (ptr - bufstart))
--- bug-891082-CVE-2014-4345-buffer-overrun-in-kadmind-with-LDAP-backend.dif.orig
+++ bug-891082-CVE-2014-4345-buffer-overrun-in-kadmind-with-LDAP-backend.dif
@@ -2,7 +2,7 @@ diff --git a/src/plugins/kdb/ldap/libkdb
index ce851ea..df5934c 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
-@@ -456,7 +456,8 @@ krb5_encode_krbsecretkey(krb5_key_data *key_data_in, int n_key_data,
+@@ -436,7 +436,8 @@ krb5_encode_krbsecretkey(krb5_key_data *key_data_in, int n_key_data,
j++;
last = i + 1;
--- krb5-1.10-selinux-label.patch.orig
+++ krb5-1.10-selinux-label.patch
@@ -43,7 +43,7 @@ Index: krb5-1.10.2/src/aclocal.m4
KRB5_LIB_PARAMS
KRB5_AC_INITFINI
KRB5_AC_ENABLE_THREADS
-@@ -1764,3 +1765,51 @@ AC_SUBST(manlocalstatedir)
+@@ -1767,3 +1768,51 @@ AC_SUBST(manlocalstatedir)
AC_SUBST(manlibexecdir)
AC_CONFIG_FILES($1)
])
@@ -133,7 +133,7 @@ Index: krb5-1.10.2/src/include/k5-int.h
===================================================================
--- krb5-1.10.2.orig/src/include/k5-int.h
+++ krb5-1.10.2/src/include/k5-int.h
-@@ -135,6 +135,7 @@ typedef unsigned char u_char;
+@@ -134,6 +134,7 @@ typedef unsigned char u_char;
typedef UINT64_TYPE krb5_ui_8;
typedef INT64_TYPE krb5_int64;
@@ -912,7 +912,7 @@ Index: krb5-1.10.2/src/plugins/kdb/db2/k
===================================================================
--- krb5-1.10.2.orig/src/plugins/kdb/db2/kdb_db2.c
+++ krb5-1.10.2/src/plugins/kdb/db2/kdb_db2.c
-@@ -683,8 +683,8 @@ ctx_create_db(krb5_context context, krb5
+@@ -687,8 +687,8 @@ ctx_create_db(krb5_context context, krb5
if (retval)
return retval;
@@ -949,7 +949,7 @@ Index: krb5-1.10.2/src/kdc/main.c
===================================================================
--- krb5-1.10.2.orig/src/kdc/main.c
+++ krb5-1.10.2/src/kdc/main.c
-@@ -909,7 +909,7 @@ write_pid_file(const char *path)
+@@ -913,7 +913,7 @@ write_pid_file(const char *path)
FILE *file;
unsigned long pid;
--- krb5-1.10-spin-loop.patch.orig
+++ krb5-1.10-spin-loop.patch
@@ -18,7 +18,7 @@ Index: krb5-1.10.2/src/lib/krb5/os/sendt
===================================================================
--- krb5-1.10.2.orig/src/lib/krb5/os/sendto_kdc.c
+++ krb5-1.10.2/src/lib/krb5/os/sendto_kdc.c
-@@ -1287,7 +1287,7 @@ k5_sendto(krb5_context context, const kr
+@@ -1291,7 +1291,7 @@ k5_sendto(krb5_context context, const kr
continue;
if (maybe_send(context, state, sel_state, callback_info))
continue;
--- krb5-1.8-pam.patch.orig
+++ krb5-1.8-pam.patch
@@ -15,7 +15,7 @@ Index: krb5-1.10.2/src/aclocal.m4
===================================================================
--- krb5-1.10.2.orig/src/aclocal.m4
+++ krb5-1.10.2/src/aclocal.m4
-@@ -1676,3 +1676,70 @@ AC_DEFUN(KRB5_AC_KEYRING_CCACHE,[
+@@ -1679,3 +1679,70 @@ AC_DEFUN(KRB5_AC_KEYRING_CCACHE,[
]))
])dnl
dnl
--- krb5-1.9-manpaths.dif.orig
+++ krb5-1.9-manpaths.dif
@@ -7,7 +7,7 @@ Index: krb5-1.10.2/src/aclocal.m4
===================================================================
--- krb5-1.10.2.orig/src/aclocal.m4
+++ krb5-1.10.2/src/aclocal.m4
-@@ -1743,3 +1743,24 @@ AC_SUBST(PAM_LIBS)
+@@ -1746,3 +1746,24 @@ AC_SUBST(PAM_LIBS)
AC_SUBST(PAM_MAN)
AC_SUBST(NON_PAM_MAN)
])dnl
--- krb5-doc.spec.orig
+++ krb5-doc.spec
@@ -1,7 +1,7 @@
#
# spec file for package krb5-doc
#
-# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -20,9 +20,9 @@ Name: krb5-doc
BuildRequires: ghostscript-library
BuildRequires: texinfo
BuildRequires: texlive-dvips
-Version: 1.10.2
+Version: 1.10.7
Release: 0
-%define srcRoot krb5-1.10.2
+%define srcRoot krb5-1.10.7
Summary: MIT Kerberos5 Implementation--Documentation
License: MIT
Group: Documentation/Other
--- krb5-mini.spec.orig
+++ krb5-mini.spec
@@ -1,7 +1,7 @@
#
# spec file for package krb5-mini
#
-# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
%define build_mini 1
-%define srcRoot krb5-1.10.2
+%define srcRoot krb5-1.10.7
%define vendorFiles %{_builddir}/%{srcRoot}/vendor-files/
%define krb5docdir %{_defaultdocdir}/krb5
@@ -30,7 +30,7 @@ BuildRequires: keyutils-devel
BuildRequires: libcom_err-devel
BuildRequires: libselinux-devel
BuildRequires: ncurses-devel
-Version: 1.10.2
+Version: 1.10.7
Release: 0
Summary: MIT Kerberos5 Implementation--Libraries
License: MIT
@@ -63,14 +63,8 @@ Patch12: krb5-1.8-api.patch
Patch13: krb5-1.8-pam.patch
Patch18: krb5-1.9-kprop-mktemp.patch
Patch19: krb5-1.9-ksu-path.patch
-Patch20: krb5-1.10-gcc47.patch
Patch21: krb5-1.10-selinux-label.patch
Patch22: krb5-1.10-spin-loop.patch
-Patch23: bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif
-Patch24: bug-807556-CVE-2012-1016-fix-PKINIT-null-pointer-deref2.dif
-Patch25: bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-deref.dif
-Patch26: bug-825985-CVE-2002-2443-fix-UDP-ping-pong.dif
-Patch27: bug-849240-CVE-2013-1418-fix-multi-realm-kdc-null-deref.dif
Patch28: bug-886016-CVE-2014-4341-CVE-2014-4342-denial-of-service-flaws-when-handling-RFC-1964-tokens.dif
Patch29: bug-888697-CVE-2014-4343-Fix-double-free-in-SPNEGO.dif
Patch30: bug-888697-CVE-2014-4344-fix-null-deref-in-SPNEGO-acceptor.dif
@@ -168,13 +162,7 @@ Include Files for Development
%patch12 -p1
%patch18 -p1
%patch19 -p1
-%patch20
%patch22 -p1
-%patch23 -p1
-%patch24 -p1
-%patch25 -p1
-%patch26 -p1
-%patch27 -p1
%patch28 -p1
%patch29 -p1
%patch30 -p1
--- krb5.changes.orig
+++ krb5.changes
@@ -21,6 +21,42 @@ Tue Jul 15 09:37:09 UTC 2014 - ckornacke
bug-886016-CVE-2014-4341-CVE-2014-4342-denial-of-service-flaws-when-handling-RFC-1964-tokens.dif
-------------------------------------------------------------------
+Mon Jun 16 12:54:06 UTC 2014 - lmuelle@suse.com
+
+- update to version 1.10.7
+ * Fix a KDC locking issue that could lead to the KDC process holding a
+ persistent lock, preventing administrative actions such as password
+ changes.
+ * Fix a number of bugs related to KDC master key rollover.
+ * Fix a KDC null pointer dereference [CVE-2013-1418] that could affect KDCs
+ that serve multiple realms.
+- update to version 1.10.6
+ * Fix a UDP ping-pong vulnerability in the kpasswd (password changing)
+ service. [CVE-2002-2443]
+ * Improve interoperability with some Windows native PKINIT clients.
+- update to version 1.10.5
+ * Fix KDC null pointer dereference in TGS-REQ handling [CVE-2013-1416]
+ * Incremental propagation could erroneously act as if a slave's database
+ were current after the slave received a full dump that failed to load.
+- update to version 1.10.4
+ * Fix null PKINIT pointer dereference vulnerabilities [CVE-2012-1016,
+ CVE-2013-1415]
+ * Prevent the KDC from returning a host-based service principal referral to
+ the local realm.
+- update to version 1.10.3
+ * Fix KDC uninitialized pointer vulnerabilities that could lead to a denial
+ of service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
+ * Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
+ requests.
+- obsolted patches:
+ * krb5-1.10-gcc47.patch
+ * bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif
+ * bug-807556-CVE-2012-1016-fix-PKINIT-null-pointer-deref2.dif
+ * bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-deref.dif
+ * bug-825985-CVE-2002-2443-fix-UDP-ping-pong.dif
+ * bug-849240-CVE-2013-1418-fix-multi-realm-kdc-null-deref.dif
+
+-------------------------------------------------------------------
Fri Nov 8 14:17:39 UTC 2013 - ckornacker@suse.de
- fix Multi-realm KDC null deref
--- krb5.spec.orig
+++ krb5.spec
@@ -1,7 +1,7 @@
#
# spec file for package krb5
#
-# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
%define build_mini 0
-%define srcRoot krb5-1.10.2
+%define srcRoot krb5-1.10.7
%define vendorFiles %{_builddir}/%{srcRoot}/vendor-files/
%define krb5docdir %{_defaultdocdir}/krb5
@@ -30,7 +30,7 @@ BuildRequires: keyutils-devel
BuildRequires: libcom_err-devel
BuildRequires: libselinux-devel
BuildRequires: ncurses-devel
-Version: 1.10.2
+Version: 1.10.7
Release: 0
Summary: MIT Kerberos5 Implementation--Libraries
License: MIT
@@ -63,14 +63,8 @@ Patch12: krb5-1.8-api.patch
Patch13: krb5-1.8-pam.patch
Patch18: krb5-1.9-kprop-mktemp.patch
Patch19: krb5-1.9-ksu-path.patch
-Patch20: krb5-1.10-gcc47.patch
Patch21: krb5-1.10-selinux-label.patch
Patch22: krb5-1.10-spin-loop.patch
-Patch23: bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif
-Patch24: bug-807556-CVE-2012-1016-fix-PKINIT-null-pointer-deref2.dif
-Patch25: bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-deref.dif
-Patch26: bug-825985-CVE-2002-2443-fix-UDP-ping-pong.dif
-Patch27: bug-849240-CVE-2013-1418-fix-multi-realm-kdc-null-deref.dif
Patch28: bug-886016-CVE-2014-4341-CVE-2014-4342-denial-of-service-flaws-when-handling-RFC-1964-tokens.dif
Patch29: bug-888697-CVE-2014-4343-Fix-double-free-in-SPNEGO.dif
Patch30: bug-888697-CVE-2014-4344-fix-null-deref-in-SPNEGO-acceptor.dif
@@ -168,13 +162,7 @@ Include Files for Development
%patch12 -p1
%patch18 -p1
%patch19 -p1
-%patch20
%patch22 -p1
-%patch23 -p1
-%patch24 -p1
-%patch25 -p1
-%patch26 -p1
-%patch27 -p1
%patch28 -p1
%patch29 -p1
%patch30 -p1