Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Contents of 7.8.1 release #1222

Open
wants to merge 17 commits into
base: heimdal-7-8-branch
Choose a base branch
from
Open

Conversation

nicowilliams
Copy link
Contributor

@nicowilliams nicowilliams commented Jan 13, 2024

I pushed e4fa0db..1b4565a to heimdal-7-1-branch. Those and the ones from the heimdal-7.8.0 tag to the new HEAD are all included here.

The commits that had already been in the heimdal-7-1-branch were a6cf945..e4fa0db:

e4fa0db roken: do not override system network address functions
28daf24 kdc: Check generate_pac() return code
f6b0433 lib/krb5: krb5_pac_parse mem leak if pac_header_size failure
5e2e89b lib/krb5: fix _krb5_get_int64 on 32-bit systems
3c9019d kuser/kinit: NO_AFS unused-but-set-variable
6fa4d05 lib/ipc: set but unused 'kr' variables
4cd3926 kdc: avoid re-encoding KDC-REQ-BODY

and the new commits are:

1b4565a Bump version to 7.8.1
191d1d4 Update NEWS for 7.8.1 release
61198c5 GHA: Enable fallback hcrypto backend for OS X build
3e7bfff GHA: Disable AFS support for Linux
7464768 GHA: Use newer Linux runners
f8c3a03 cf: Deal with clang-format not being available
f136efa hcrypto: Don't test rc2 nor rc4 (OS X)
cd4f7c9 kinit: Fix build error
d60d2ea kadm5: Added kadm_log_init_recover
d2faa38 ipropd_slave: open hdb around kadm5_log_init in case recovery needed

lhoward and others added 17 commits November 16, 2022 13:25
Use --preserve-binary=KDC-REQ-BODY option to ASN.1 compiler to avoid
re-encoding KDC-REQ-BODYs for verification in GSS preauth, TGS and PKINIT.

[abartlet@samba.org adapted from Heimdal commit
 ebfd48e
 by removing references to FAST and GSS-pre-auth.

 This fixes the Windows 11 22H2 issue with TGS-REQ
 as seen at https:github.com//issues/1011 and so
 removes the knownfail file for this test]

FIXES: 1011

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
mach_complete_async() and mach_complete_sync() are void functions.
Nothing uses the 'kr' value after being set which results in

  error: variable 'kr' set but not used [-Werror,-Wunused-but-set-variable]

Remove the variables.
When NO_AFS is defined, 'ret' is set but unused resulting in a build
failure on macOS.

  error: variable 'ret' set but not used [-Werror,-Wunused-but-set-variable
On systems where 'unsigned long' is 32-bits and the 'size'
parameter is set to 8 and the bytes are:

  0x78 0x00 0x00 0x00 0x00 0x00 0x00 0x00

When 'i' becomes 4 'v' will be 0 again. As 'unsigned long' is only
able to hold 4 bytes.

Change the type of 'v' from 'unsigned long' to 'uint64_t' which
matches the type of the output parameter 'value'.

(cherry picked from commit 9d1bfab)

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org>
CVE: CVE-2022-42898
Samba-BUG: https://bugzilla.samba.org/show_bug.cgi?id=15203
48 byte memory leak from krb5_pac_parse() each time pac_header_size()
fails.
If the function fails, we should not issue a ticket missing the PAC.

(cherry picked from commit 05e589d)
Roken functions rk_copyhostent(), rk_freeaddrinfo(), rk_freehostent()
rk_getaddrinfo(), rk_getipnodebyaddr(),  rk_getipnodebyname(), and
rk_getnameinfo() should never be built without the "rk_" prefix.  Doing
so overrides the system provided functions of the same name when they
exist.

(cherry picked from commit 7b3a993)
log_init in the event a log is found will do recovery. kadm5_log_replay
will call methods which expect an hdb_db to be set but without this
none is
This takes care of opening and closing the database for use with log possible
recovery, without immediate intent to keep the database open for one or more
changes.  This simplifies code in kadmin/load.c and lib/kadm5/ipropd_slave.c.
This is just for 7.8.1.  Do not pull this into master.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants