aboutsummaryrefslogtreecommitdiff
path: root/security/sssd/files/patch-src_external_pac__responder.m4
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2020-12-12 15:09:15 +0000
committerRene Ladan <rene@FreeBSD.org>2020-12-12 15:09:15 +0000
commit6592a822122a3d2bf252ccd85dd40b85b09dde59 (patch)
tree2b93a21c9e067c02f1a583dbc6d8157ffaea1a57 /security/sssd/files/patch-src_external_pac__responder.m4
parent693a9581667ca0ab414315d4f29d67c490c480c2 (diff)
downloadports-6592a822122a3d2bf252ccd85dd40b85b09dde59.tar.gz
ports-6592a822122a3d2bf252ccd85dd40b85b09dde59.zip
MFH: r555585 r557829
security/sssd: update to 1.16.5 This fixes several security vulnerabilities and unexpires the port because it moves to Python 3. PR: 241347 Submitted by: lukas.slebodnik@intrak.sk (initial patch) Security: CVE-2018-16838 Security: CVE-2019-3811 security/sssd: fix SMB option - use Samba 4.12 instead of the removed Samba 4.10 - use ldb 2.1 instead of ldb 2.0 While here, recognize Kerberos 1.18 PR: 250864 Submitted by: joerg (patch by Richard Frewin) Approved by: maintainer timeout (14 days)
Notes
Notes: svn path=/branches/2020Q4/; revision=557830
Diffstat (limited to 'security/sssd/files/patch-src_external_pac__responder.m4')
-rw-r--r--security/sssd/files/patch-src_external_pac__responder.m425
1 files changed, 0 insertions, 25 deletions
diff --git a/security/sssd/files/patch-src_external_pac__responder.m4 b/security/sssd/files/patch-src_external_pac__responder.m4
deleted file mode 100644
index 291a04fbf182..000000000000
--- a/security/sssd/files/patch-src_external_pac__responder.m4
+++ /dev/null
@@ -1,25 +0,0 @@
---- src/external/pac_responder.m4.orig 2014-09-17 13:01:37 UTC
-+++ src/external/pac_responder.m4
-@@ -14,14 +14,20 @@ then
- PKG_CHECK_MODULES(NDR_KRB5PAC, ndr_krb5pac, ndr_krb5pac_ok=yes,
- AC_MSG_WARN([Cannot build pac responder without libndr_krb5pac]))
-
-- AC_PATH_PROG(KRB5_CONFIG, krb5-config)
-+ AC_PATH_PROG(KRB5_CONFIG, krb5-config, [], [/usr/local/bin:$PATH])
- AC_MSG_CHECKING(for supported MIT krb5 version)
- KRB5_VERSION="`$KRB5_CONFIG --version`"
- case $KRB5_VERSION in
- Kerberos\ 5\ release\ 1.9* | \
- Kerberos\ 5\ release\ 1.10* | \
- Kerberos\ 5\ release\ 1.11* | \
-- Kerberos\ 5\ release\ 1.12*)
-+ Kerberos\ 5\ release\ 1.12* | \
-+ Kerberos\ 5\ release\ 1.13* | \
-+ Kerberos\ 5\ release\ 1.14* | \
-+ Kerberos\ 5\ release\ 1.15* | \
-+ Kerberos\ 5\ release\ 1.16* | \
-+ Kerberos\ 5\ release\ 1.17* | \
-+ Kerberos\ 5\ release\ 1.18*)
- krb5_version_ok=yes
- AC_MSG_RESULT([yes])
- ;;