File krb5.changes of Package krb5-mini
1899
1
-------------------------------------------------------------------
2
Wed Jan 30 12:32:33 UTC 2019 - Samuel Cabrero <scabrero@suse.de>
3
4
- Upgrade to 1.16.3
5
* Fix a regression in the MEMORY credential cache type which could cause
6
client programs to crash.
7
* MEMORY credential caches will not be listed in the global collection,
8
with the exception of the default credential cache if it is of type MEMORY.
9
* Remove an incorrect assertion in the KDC which could be used to cause
10
a crash [CVE-2018-20217].
11
* Fix bugs with concurrent use of MEMORY ccache handles.
12
* Fix a KDC crash when falling back between multiple OTP tokens configured
13
for a principal entry.
14
* Fix memory bugs when gss_add_cred() is used to create a new credential,
15
and fix a bug where it ignores the desired_name.
16
* Fix the behavior of gss_inquire_cred_by_mech() when the credential does
17
not contain an element of the requested mechanism.
18
* Make cross-realm S4U2Self requests work on the client when no
19
default_realm is configured.
20
* Add a kerberos(7) man page containing documentation of the environment
21
variables that affect Kerberos programs.
22
- Use systemd-tmpfiles to create files under /var/lib/kerberos, required
23
by transactional updates; (bsc#1100126);
24
- Rename patches:
25
* krb5-1.12-pam.patch => 0001-krb5-1.12-pam.patch
26
* krb5-1.9-manpaths.dif => 0002-krb5-1.9-manpaths.patch
27
* krb5-1.12-buildconf.patch => 0003-krb5-1.12-buildconf.patch
28
* krb5-1.6.3-gssapi_improve_errormessages.dif to
29
0004-krb5-1.6.3-gssapi_improve_errormessages.patch
30
* krb5-1.6.3-ktutil-manpage.dif => 0005-krb5-1.6.3-ktutil-manpage.patch
31
* krb5-1.12-api.patch => 0006-krb5-1.12-api.patch
32
* krb5-1.12-ksu-path.patch => 0007-krb5-1.12-ksu-path.patch
33
* krb5-1.12-selinux-label.patch => 0008-krb5-1.12-selinux-label.patch
34
* krb5-1.9-debuginfo.patch => 0009-krb5-1.9-debuginfo.patch
35
36
-------------------------------------------------------------------
37
Tue Oct 9 20:00:21 UTC 2018 - James McDonough <jmcdonough@suse.com>
38
39
- Upgrade to 1.16.1
40
* kdc client cert matching on client principal entry
41
* Allow ktutil addent command to ignore key version and use
42
non-default salt string.
43
* add kpropd pidfile support
44
* enable "encrypted_challenge_indicator" realm option on tickets
45
obtained using FAST encrypted challenge pre-authentication.
46
* dates through 2106 accepted
47
* KDC support for trivially renewable tickets
48
* stop caching referral and alternate cross-realm TGTs to prevent
49
duplicate credential cache entries
50
51
-------------------------------------------------------------------
52
Mon Jun 18 11:02:57 UTC 2018 - mcepl@suse.com
53
54
- BSC#1021402 move %{_libdir}/krb5/plugins/tls/k5tls.so to krb5 package
55
so it is avaiable for krb5-client as well.
56
57
-------------------------------------------------------------------
58
Fri May 4 09:48:36 UTC 2018 - michael@stroeder.com
59
60
- Upgrade to 1.15.3
61
* Fix flaws in LDAP DN checking, including a null dereference KDC
62
crash which could be triggered by kadmin clients with administrative
63
privileges [CVE-2018-5729, CVE-2018-5730].
64
* Fix a KDC PKINIT memory leak.
65
* Fix a small KDC memory leak on transited or authdata errors when
66
processing TGS requests.
67
* Fix a null dereference when the KDC sends a large TGS reply.
68
* Fix "kdestroy -A" with the KCM credential cache type.
69
* Fix the handling of capaths "." values.
70
* Fix handling of repeated subsection specifications in profile files
71
(such as when multiple included files specify relations in the same
72
subsection).
73
74
-------------------------------------------------------------------
75
Wed Apr 25 21:54:39 UTC 2018 - luizluca@gmail.com
76
77
- Added support for /etc/krb5.conf.d/ for configuration snippets
78
79
-------------------------------------------------------------------
80
Thu Nov 23 13:38:38 UTC 2017 - rbrown@suse.com
81
82
- Replace references to /var/adm/fillup-templates with new
83
%_fillupdir macro (boo#1069468)
84
85
-------------------------------------------------------------------
86
Mon Nov 6 10:23:00 UTC 2017 - hguo@suse.com
87
88
- Remove build dependency doxygen, python-Cheetah, python-Sphinx,
89
python-libxml2, python-lxml, most of which are python 2 programs.
90
Consequently remove -doc subpackage. Users are encouraged to use
91
online documentation. (bsc#1066461)
92
93
-------------------------------------------------------------------
94
Mon Oct 2 22:53:28 UTC 2017 - jengelh@inai.de
95
96
- Update package descriptions.
97
98
-------------------------------------------------------------------
99
Mon Sep 25 19:45:05 UTC 2017 - michael@stroeder.com
100
101
- Upgrade to 1.15.2
102
* Fix a KDC denial of service vulnerability caused by unset status
103
strings [CVE-2017-11368]
104
* Preserve GSS contexts on init/accept failure [CVE-2017-11462]
105
* Fix kadm5 setkey operation with LDAP KDB module
106
* Use a ten-second timeout after successful connection for HTTPS KDC
107
requests, as we do for TCP requests
108
* Fix client null dereference when KDC offers encrypted challenge
109
without FAST
110
* Ignore dotfiles when processing profile includedir directive
111
* Improve documentation
112
113
-------------------------------------------------------------------
114
Fri Aug 18 08:27:26 UTC 2017 - hguo@suse.com
115
116
- Set "rdns" and "dns_canonicalize_hostname" to false in krb5.conf
117
in order to improve client security in handling service principle
118
names. (bsc#1054028)
119
120
-------------------------------------------------------------------
121
Fri Aug 11 09:08:58 UTC 2017 - hguo@suse.com
122
123
- Prevent kadmind.service startup failure caused by absence of
124
LDAP service. (bsc#903543)
125
126
-------------------------------------------------------------------
127
Tue Jun 6 13:36:34 UTC 2017 - hguo@suse.com
128
129
- There is no change made about the package itself, this is only
130
copying over some changelog texts from SLE package:
131
- bug#918595 owned by varkoly@suse.com: VUL-0: CVE-2014-5355
132
krb5: denial of service in krb5_read_message
133
- bug#912002 owned by varkoly@suse.com: VUL-0
134
CVE-2014-5352, CVE-2014-9421, CVE-2014-9422, CVE-2014-9423:
135
krb5: Vulnerabilities in kadmind, libgssrpc, gss_process_context_token
136
- bug#910458 owned by varkoly@suse.com: VUL-1
137
CVE-2014-5354: krb5: NULL pointer dereference when using keyless entries
138
- bug#928978 owned by varkoly@suse.com: VUL-0
139
CVE-2015-2694: krb5: issues in OTP and PKINIT kdcpreauth modules leading
140
to requires_preauth bypass
141
- bug#910457 owned by varkoly@suse.com: VUL-1
142
CVE-2014-5353: krb5: NULL pointer dereference when using a ticket policy
143
name as a password policy name
144
- bug#991088 owned by hguo@suse.com: VUL-1
145
CVE-2016-3120: krb5: S4U2Self KDC crash when anon is restricted
146
- bug#992853 owned by hguo@suse.com: krb5: bogus prerequires
147
- [fate#320326](https://fate.suse.com/320326)
148
- bug#982313 owned by pgajdos@suse.com: Doxygen unable to resolve reference
149
from \cite
150
151
-------------------------------------------------------------------
152
Thu Apr 6 12:58:53 CEST 2017 - kukuk@suse.de
153
154
- Remove wrong PreRequires from krb5
155
156
-------------------------------------------------------------------
157
Thu Mar 9 20:58:42 UTC 2017 - michael@stroeder.com
158
159
- use HTTPS project and source URLs
160
161
-------------------------------------------------------------------
162
Thu Mar 9 16:31:41 UTC 2017 - meissner@suse.com
163
164
- use source urls.
165
- krb5.keyring: Added Greg Hudson
166
167
-------------------------------------------------------------------
168
Sat Mar 4 21:29:34 UTC 2017 - michael@stroeder.com
169
170
- removed obsolete krb5-1.15-fix_kdb_free_principal_e_data.patch
171
- Upgrade to 1.15.1
172
* Allow KDB modules to determine how the e_data field of principal
173
fields is freed
174
* Fix udp_preference_limit when the KDC location is configured with
175
SRV records
176
* Fix KDC and kadmind startup on some IPv4-only systems
177
* Fix the processing of PKINIT certificate matching rules which have
178
two components and no explicit relation
179
* Improve documentation
180
181
-------------------------------------------------------------------
182
Fri Jan 27 14:50:39 UTC 2017 - bwiedemann@suse.com
183
184
- remove useless environment.pickle to make build-compare happy
185
186
-------------------------------------------------------------------
187
Thu Jan 19 15:59:38 UTC 2017 - asn@cryptomilk.org
188
189
- Introduce patch
190
krb5-1.15-fix_kdb_free_principal_e_data.patch
191
to fix freeing of e_data in the kdb principal
192
193
-------------------------------------------------------------------
194
Sat Dec 3 13:04:11 UTC 2016 - michael@stroeder.com
195
196
- Upgrade to 1.15
197
- obsoleted Patch7 (krb5-1.7-doublelog.patch) fixed in 1.12.2
198
- obsoleted patch to src/util/gss-kernel-lib/Makefile.in since
199
file is not available in upstream source anymore
200
- obsoleted Patch15 (krb5-fix_interposer.patch) fixed in 1.15
201
202
- Upgrade from 1.14.4 to 1.15 - major changes:
203
Administrator experience:
204
* Add support to kadmin for remote extraction of current keys without
205
changing them (requires a special kadmin permission that is excluded
206
from the wildcard permission), with the exception of highly
207
protected keys.
208
* Add a lockdown_keys principal attribute to prevent retrieval of the
209
principal's keys (old or new) via the kadmin protocol. In newly
210
created databases, this attribute is set on the krbtgt and kadmin
211
principals.
212
* Restore recursive dump capability for DB2 back end, so sites can
213
more easily recover from database corruption resulting from power
214
failure events.
215
* Add DNS auto-discovery of KDC and kpasswd servers from URI records,
216
in addition to SRV records. URI records can convey TCP and UDP
217
servers and master KDC status in a single DNS lookup, and can also
218
point to HTTPS proxy servers.
219
* Add support for password history to the LDAP back end.
220
* Add support for principal renaming to the LDAP back end.
221
* Use the getrandom system call on supported Linux kernels to avoid
222
blocking problems when getting entropy from the operating system.
223
* In the PKINIT client, use the correct DigestInfo encoding for PKCS
224
#1 signatures, so that some especially strict smart cards will work.
225
Code quality:
226
* Clean up numerous compilation warnings.
227
* Remove various infrequently built modules, including some preauth
228
modules that were not built by default.
229
Developer experience:
230
* Add support for building with OpenSSL 1.1.
231
* Use SHA-256 instead of MD5 for (non-cryptographic) hashing of
232
authenticators in the replay cache. This helps sites that must
233
build with FIPS 140 conformant libraries that lack MD5.
234
Protocol evolution:
235
* Add support for the AES-SHA2 enctypes, which allows sites to conform
236
to Suite B crypto requirements.
237
238
- Upgrade from 1.14.3 to 1.14.4 - major changes:
239
* Fix some rare btree data corruption bugs
240
* Fix numerous minor memory leaks
241
* Improve portability (Linux-ppc64el, FreeBSD)
242
* Improve some error messages
243
* Improve documentation
244
245
-------------------------------------------------------------------
246
Mon Nov 14 08:36:06 UTC 2016 - christof.hanke@rzg.mpg.de
247
248
- add pam configuration file required for ksu
249
just use a copy of "su" one from Tumbleweed
250
251
-------------------------------------------------------------------
252
Fri Jul 22 08:45:19 UTC 2016 - michael@stroeder.com
253
254
- Upgrade from 1.14.2 to 1.14.3:
255
* Improve some error messages
256
* Improve documentation
257
* Allow a principal with nonexistent policy to bypass the minimum
258
password lifetime check, consistent with other aspects of
259
nonexistent policies
260
* Fix a rare KDC denial of service vulnerability when anonymous client
261
principals are restricted to obtaining TGTs only [CVE-2016-3120]
262
263
-------------------------------------------------------------------
264
Sat Jul 2 11:38:54 UTC 2016 - idonmez@suse.com
265
266
- Remove comments breaking post scripts.
267
268
-------------------------------------------------------------------
269
Thu Jun 30 13:34:29 UTC 2016 - fcrozat@suse.com
270
271
- Do no use systemd_requires macros in main package, it adds
272
unneeded dependencies which pulls systemd into minimal chroot.
273
- Only call %insserv_prereq when building for pre-systemd
274
distributions.
275
- Optimise some %post/%postun when only /sbin/ldconfig is called.
276
277
------------------------------------------------------------------
278
Tue May 10 12:41:14 UTC 2016 - hguo@suse.com
279
280
- Remove source file ccapi/common/win/OldCC/autolock.hxx
281
that is not needed and does not carry an acceptable license.
282
(bsc#968111)
283
284
-------------------------------------------------------------------
285
Thu Apr 28 20:27:37 UTC 2016 - michael@stroeder.com
286
287
- removed obsolete patches:
288
* 0107-Fix-LDAP-null-deref-on-empty-arg-CVE-2016-3119.patch
289
* krb5-mechglue_inqure_attrs.patch
290
- Upgrade from 1.14.1 to 1.14.2:
291
* Fix a moderate-severity vulnerability in the LDAP KDC back end that
292
could be exploited by a privileged kadmin user [CVE-2016-3119]
293
* Improve documentation
294
* Fix some interactions with GSSAPI interposer mechanisms
295
296
-------------------------------------------------------------------
297
Fri Apr 1 07:45:13 UTC 2016 - hguo@suse.com
298
299
- Upgrade from 1.14 to 1.14.1:
300
* Remove expired patches:
301
0104-Verify-decoded-kadmin-C-strings-CVE-2015-8629.patch
302
0105-Fix-leaks-in-kadmin-server-stubs-CVE-2015-8631.patch
303
0106-Check-for-null-kadm5-policy-name-CVE-2015-8630.patch
304
krbdev.mit.edu-8301.patch
305
* Replace source archives:
306
krb5-1.14.tar.gz ->
307
krb5-1.14.1.tar.gz
308
krb5-1.14.tar.gz.asc ->
309
krb5-1.14.1.tar.gz.asc
310
* Adjust line numbers in:
311
krb5-fix_interposer.patch
312
313
-------------------------------------------------------------------
314
Wed Mar 23 13:02:48 UTC 2016 - hguo@suse.com
315
316
- Introduce patch
317
0107-Fix-LDAP-null-deref-on-empty-arg-CVE-2016-3119.patch
318
to fix CVE-2016-3119 (bsc#971942)
319
320
-------------------------------------------------------------------
321
Thu Feb 11 15:06:31 UTC 2016 - hguo@suse.com
322
323
- Remove krb5-mini pieces from spec file.
324
Hence remove pre_checkin.sh
325
- Remove expired macros and other minor clean-ups in spec file.
326
327
-------------------------------------------------------------------
328
Tue Feb 2 08:41:13 UTC 2016 - hguo@suse.com
329
330
- Fix CVE-2015-8629: krb5: xdr_nullstring() doesn't check for terminating null character
331
with patch 0104-Verify-decoded-kadmin-C-strings-CVE-2015-8629.patch
332
(bsc#963968)
333
- Fix CVE-2015-8631: krb5: Memory leak caused by supplying a null principal name in request
334
with patch 0105-Fix-leaks-in-kadmin-server-stubs-CVE-2015-8631.patch
335
(bsc#963975)
336
- Fix CVE-2015-8630: krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
337
with patch 0106-Check-for-null-kadm5-policy-name-CVE-2015-8630.patch
338
(bsc#963964)
339
340
-------------------------------------------------------------------
341
Mon Jan 11 12:33:54 UTC 2016 - idonmez@suse.com
342
343
- Add two patches from Fedora, fixing two crashes:
344
* krb5-fix_interposer.patch
345
* krb5-mechglue_inqure_attrs.patch
346
347
-------------------------------------------------------------------
348
Tue Dec 8 20:40:26 UTC 2015 - michael@stroeder.com
349
350
- Update to 1.14
351
- dropped krb5-kvno-230379.patch
352
- added krbdev.mit.edu-8301.patch fixing wrong function call
353
354
Major changes in 1.14 (2015-11-20)
355
==================================
356
357
Administrator experience:
358
359
* Add a new kdb5_util tabdump command to provide reporting-friendly
360
tabular dump formats (tab-separated or CSV) for the KDC database.
361
Unlike the normal dump format, each output table has a fixed number
362
of fields. Some tables include human-readable forms of data that
363
are opaque in ordinary dump files. This format is also suitable for
364
importing into relational databases for complex queries.
365
* Add support to kadmin and kadmin.local for specifying a single
366
command line following any global options, where the command
367
arguments are split by the shell--for example, "kadmin getprinc
368
principalname". Commands issued this way do not prompt for
369
confirmation or display warning messages, and exit with non-zero
370
status if the operation fails.
371
* Accept the same principal flag names in kadmin as we do for the
372
default_principal_flags kdc.conf variable, and vice versa. Also
373
accept flag specifiers in the form that kadmin prints, as well as
374
hexadecimal numbers.
375
* Remove the triple-DES and RC4 encryption types from the default
376
value of supported_enctypes, which determines the default key and
377
salt types for new password-derived keys. By default, keys will
378
only created only for AES128 and AES256. This mitigates some types
379
of password guessing attacks.
380
* Add support for directory names in the KRB5_CONFIG and
381
KRB5_KDC_PROFILE environment variables.
382
* Add support for authentication indicators, which are ticket
383
annotations to indicate the strength of the initial authentication.
384
Add support for the "require_auth" string attribute, which can be
385
set on server principal entries to require an indicator when
386
authenticating to the server.
387
* Add support for key version numbers larger than 255 in keytab files,
388
and for version numbers up to 65535 in KDC databases.
389
* Transmit only one ETYPE-INFO and/or ETYPE-INFO2 entry from the KDC
390
during pre-authentication, corresponding to the client's most
391
preferred encryption type.
392
* Add support for server name identification (SNI) when proxying KDC
393
requests over HTTPS.
394
* Add support for the err_fmt profile parameter, which can be used to
395
generate custom-formatted error messages.
396
397
Code quality:
398
399
* Fix memory aliasing issues in SPNEGO and IAKERB mechanisms that
400
could cause server crashes. [CVE-2015-2695] [CVE-2015-2696]
401
[CVE-2015-2698]
402
* Fix build_principal memory bug that could cause a KDC
403
crash. [CVE-2015-2697]
404
405
Developer experience:
406
407
* Change gss_acquire_cred_with_password() to acquire credentials into
408
a private memory credential cache. Applications can use
409
gss_store_cred() to make the resulting credentials visible to other
410
processes.
411
* Change gss_acquire_cred() and SPNEGO not to acquire credentials for
412
IAKERB or for non-standard variants of the krb5 mechanism OID unless
413
explicitly requested. (SPNEGO will still accept the Microsoft
414
variant of the krb5 mechanism OID during negotiation.)
415
* Change gss_accept_sec_context() not to accept tokens for IAKERB or
416
for non-standard variants of the krb5 mechanism OID unless an
417
acceptor credential is acquired for those mechanisms.
418
* Change gss_acquire_cred() to immediately resolve credentials if the
419
time_rec parameter is not NULL, so that a correct expiration time
420
can be returned. Normally credential resolution is delayed until
421
the target name is known.
422
* Add krb5_prepend_error_message() and krb5_wrap_error_message() APIs,
423
which can be used by plugin modules or applications to add prefixes
424
to existing detailed error messages.
425
* Add krb5_c_prfplus() and krb5_c_derive_prfplus() APIs, which
426
implement the RFC 6113 PRF+ operation and key derivation using PRF+.
427
* Add support for pre-authentication mechanisms which use multiple
428
round trips, using the the KDC_ERR_MORE_PREAUTH_DATA_REQUIRED error
429
code. Add get_cookie() and set_cookie() callbacks to the kdcpreauth
430
interface; these callbacks can be used to save marshalled state
431
information in an encrypted cookie for the next request.
432
* Add a client_key() callback to the kdcpreauth interface to retrieve
433
the chosen client key, corresponding to the ETYPE-INFO2 entry sent
434
by the KDC.
435
* Add an add_auth_indicator() callback to the kdcpreauth interface,
436
allowing pre-authentication modules to assert authentication
437
indicators.
438
* Add support for the GSS_KRB5_CRED_NO_CI_FLAGS_X cred option to
439
suppress sending the confidentiality and integrity flags in GSS
440
initiator tokens unless they are requested by the caller. These
441
flags control the negotiated SASL security layer for the Microsoft
442
GSS-SPNEGO SASL mechanism.
443
* Make the FILE credential cache implementation less prone to
444
corruption issues in multi-threaded programs, especially on
445
platforms with support for open file description locks.
446
447
Performance:
448
449
* On slave KDCs, poll the master KDC immediately after processing a
450
full resync, and do not require two full resyncs after the master
451
KDC's log file is reset.
452
453
User experience:
454
455
* Make gss_accept_sec_context() accept tickets near their expiration
456
but within clock skew tolerances, rather than rejecting them
457
immediately after the server's view of the ticket expiration time.
458
459
-------------------------------------------------------------------
460
Mon Dec 7 08:04:45 UTC 2015 - michael@stroeder.com
461
462
- Update to 1.13.3
463
- removed patches for security fixes now in upstream source:
464
0100-Fix-build_principal-memory-bug-CVE-2015-2697.patch
465
0101-Fix-IAKERB-context-aliasing-bugs-CVE-2015-2696.patch
466
0102-Fix-SPNEGO-context-aliasing-bugs-CVE-2015-2695.patch
467
0103-Fix-IAKERB-context-export-import-CVE-2015-2698.patch
468
469
Major changes in 1.13.3 (2015-12-04)
470
====================================
471
472
This is a bug fix release. The krb5-1.13 release series is in
473
maintenance, and for new deployments, installers should prefer the
474
krb5-1.14 release series or later.
475
476
* Fix memory aliasing issues in SPNEGO and IAKERB mechanisms that
477
could cause server crashes. [CVE-2015-2695] [CVE-2015-2696]
478
[CVE-2015-2698]
479
* Fix build_principal memory bug that could cause a KDC
480
crash. [CVE-2015-2697]
481
* Allow an iprop slave to receive full resyncs from KDCs running
482
krb5-1.10 or earlier.
483
484
-------------------------------------------------------------------
485
Tue Nov 10 14:57:01 UTC 2015 - hguo@suse.com
486
487
- Apply patch 0103-Fix-IAKERB-context-export-import-CVE-2015-2698.patch
488
to fix a memory corruption regression introduced by resolution of
489
CVE-2015-2698. bsc#954204
490
491
-------------------------------------------------------------------
492
Wed Oct 28 13:54:39 UTC 2015 - hguo@suse.com
493
494
- Make kadmin.local man page available without having to install krb5-client. bsc#948011
495
- Apply patch 0100-Fix-build_principal-memory-bug-CVE-2015-2697.patch
496
to fix build_principal memory bug [CVE-2015-2697] bsc#952190
497
- Apply patch 0101-Fix-IAKERB-context-aliasing-bugs-CVE-2015-2696.patch
498
to fix IAKERB context aliasing bugs [CVE-2015-2696] bsc#952189
499
- Apply patch 0102-Fix-SPNEGO-context-aliasing-bugs-CVE-2015-2695.patch
500
to fix SPNEGO context aliasing bugs [CVE-2015-2695] bsc#952188
501
502
-------------------------------------------------------------------
503
Mon Jun 1 07:31:52 UTC 2015 - hguo@suse.com
504
505
- Let server depend on libev (module of libverto). This was the
506
preferred implementation before the seperation of libverto from krb.
507
508
-------------------------------------------------------------------
509
Thu May 28 08:01:00 UTC 2015 - dimstar@opensuse.org
510
511
- Drop libverto and libverto-libev Requires from the -server
512
package: those package names don't exist and the shared libs
513
are pulled in automatically.
514
515
-------------------------------------------------------------------
516
Wed May 27 10:59:13 UTC 2015 - dimstar@opensuse.org
517
518
- Unconditionally buildrequire libverto-devel: krb5-mini also
519
depends on it.
520
521
-------------------------------------------------------------------
522
Fri May 22 09:27:11 UTC 2015 - meissner@suse.com
523
524
- pre_checkin.sh aligned changes between krb5/krb5-mini
525
- added krb5.keyring
526
527
-------------------------------------------------------------------
528
Tue May 12 07:48:18 UTC 2015 - michael@stroeder.com
529
530
- update to krb5 1.13.2
531
532
- DES transition
533
==============
534
535
The Data Encryption Standard (DES) is widely recognized as weak. The
536
krb5-1.7 release contains measures to encourage sites to migrate away
537
- From using single-DES cryptosystems. Among these is a configuration
538
variable that enables "weak" enctypes, which defaults to "false"
539
beginning with krb5-1.8.
540
541
542
Major changes in 1.13.2 (2015-05-08)
543
====================================
544
545
This is a bug fix release.
546
547
* Fix a minor vulnerability in krb5_read_message, which is primarily
548
used in the BSD-derived kcmd suite of applications. [CVE-2014-5355]
549
550
* Fix a bypass of requires_preauth in KDCs that have PKINIT enabled.
551
[CVE-2015-2694]
552
553
* Fix some issues with the LDAP KDC database back end.
554
555
* Fix an iteration-related memory leak in the DB2 KDC database back
556
end.
557
558
* Fix issues with some less-used kadm5.acl functionality.
559
560
* Improve documentation.
561
562
-------------------------------------------------------------------
563
Thu Apr 23 14:13:03 UTC 2015 - hguo@suse.com
564
565
- Use externally built libverto
566
567
-------------------------------------------------------------------
568
Wed Feb 18 11:48:46 UTC 2015 - michael@stroeder.com
569
570
- update to krb5 1.13.1
571
572
Major changes in 1.13.1 (2015-02-11)
573
====================================
574
575
This is a bug fix release.
576
577
* Fix multiple vulnerabilities in the LDAP KDC back end.
578
[CVE-2014-5354] [CVE-2014-5353]
579
580
* Fix multiple kadmind vulnerabilities, some of which are based in the
581
gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421
582
CVE-2014-9422 CVE-2014-9423]
583
584
-------------------------------------------------------------------
585
Tue Jan 6 07:12:29 UTC 2015 - mlin@suse.com
586
587
- Update to krb5 1.13
588
* Add support for accessing KDCs via an HTTPS proxy server using the
589
MS-KKDCP protocol.
590
* Add support for hierarchical incremental propagation, where slaves
591
can act as intermediates between an upstream master and other downstream
592
slaves.
593
* Add support for configuring GSS mechanisms using /etc/gss/mech.d/*.conf
594
files in addition to /etc/gss/mech.
595
* Add support to the LDAP KDB module for binding to the LDAP server using
596
SASL.
597
* The KDC listens for TCP connections by default.
598
* Fix a minor key disclosure vulnerability where using the "keepold" option
599
to the kadmin randkey operation could return the old keys. [CVE-2014-5351]
600
* Add client support for the Kerberos Cache Manager protocol. If the host
601
is running a Heimdal kcm daemon, caches served by the daemon can be
602
accessed with the KCM: cache type.
603
* When built on OS X 10.7 and higher, use "KCM:" as the default cache type,
604
unless overridden by command-line options or krb5-config values.
605
* Add support for doing unlocked database dumps for the DB2 KDC back end,
606
which would allow the KDC and kadmind to continue accessing the database
607
during lengthy database dumps.
608
- Removed patches, useless or upstreamed
609
* krb5-1.9-kprop-mktemp.patch
610
* krb5-1.10-ksu-access.patch
611
* krb5-1.12-doxygen.patch
612
* bnc#897874-CVE-2014-5351.diff
613
* krb5-1.13-work-around-replay-cache-creation-race.patch
614
* krb5-1.10-kpasswd_tcp.patch
615
- Refreshed patches
616
* krb5-1.12-pam.patch
617
* krb5-1.12-selinux-label.patch
618
* krb5-1.7-doublelog.patch
619
620
-------------------------------------------------------------------
621
Thu Sep 25 12:48:32 UTC 2014 - ddiss@suse.com
622
623
- Work around replay cache creation race; (bnc#898439).
624
krb5-1.13-work-around-replay-cache-creation-race.patch
625
626
-------------------------------------------------------------------
627
Tue Sep 23 13:25:33 UTC 2014 - varkoly@suse.com
628
629
- bnc#897874 CVE-2014-5351: krb5: current keys returned when randomizing the keys for a service principal
630
- added patches:
631
* bnc#897874-CVE-2014-5351.diff
632
-------------------------------------------------------------------
633
Sat Aug 30 22:29:28 UTC 2014 - andreas.stieger@gmx.de
634
635
- krb5 5.12.2:
636
* Work around a gcc optimizer bug that could cause DB2 KDC
637
database operations to spin in an infinite loop
638
* Fix a backward compatibility problem with the LDAP KDB schema
639
that could prevent krb5-1.11 and later from decoding entries
640
created by krb5-1.6.
641
* Avoid an infinite loop under some circumstances when the GSS
642
mechglue loads a dynamic mechanism.
643
* Fix krb5kdc argument parsing so "-w" and "-r" options work
644
togetherreliably.
645
- Vulnerability fixes previously fixed in package via patches:
646
* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
647
invalid memory reference vulnerabilities. [CVE-2014-4341
648
CVE-2014-4342]
649
* Fix memory management vulnerabilities in GSSAPI SPNEGO.
650
[CVE-2014-4343 CVE-2014-4344]
651
* Fix buffer overflow vulnerability in LDAP KDB back end.
652
[CVE-2014-4345]
653
- updated patches:
654
* krb5-1.7-doublelog.patch for context change
655
* krb5-1.6.3-ktutil-manpage.dif, same
656
- removed patches, in upstream:
657
* krb5-master-keyring-kdcsync.patch
658
* krb5-1.12-CVE-2014-4341-CVE-2014-4342.patch
659
* krb5-1.12-CVE-2014-4343-Fix-double-free-in-SPNEGO.patch
660
* krb5-1.12-CVE-2014-4344-Fix-null-deref-in-SPNEGO-acceptor.patch
661
* krb5-1.12-CVE-2014-4345-buffer-overrun-in-kadmind-with-LDAP-backend.patch
662
- Fix build with doxygen 1.8.8 - adding krb5-1.12-doxygen.patch
663
from upstream
664
665
-------------------------------------------------------------------
666
Fri Aug 8 15:55:01 UTC 2014 - ckornacker@suse.com
667
668
- buffer overrun in kadmind with LDAP backend
669
CVE-2014-4345 (bnc#891082)
670
krb5-1.12-CVE-2014-4345-buffer-overrun-in-kadmind-with-LDAP-backend.patch
671
672
-------------------------------------------------------------------
673
Mon Jul 28 09:22:06 UTC 2014 - ckornacker@suse.com
674
675
- Fix double-free in SPNEGO [CVE-2014-4343] (bnc#888697)
676
krb5-1.12-CVE-2014-4343-Fix-double-free-in-SPNEGO.patch
677
Fix null deref in SPNEGO acceptor [CVE-2014-4344]
678
krb5-1.12-CVE-2014-4344-Fix-null-deref-in-SPNEGO-acceptor.patch
679
680
-------------------------------------------------------------------
681
Sat Jul 19 12:38:21 UTC 2014 - p.drouand@gmail.com
682
683
- Do not depend of insserv if systemd is used
684
685
-------------------------------------------------------------------
686
Thu Jul 10 15:59:52 UTC 2014 - ckornacker@suse.com
687
688
- denial of service flaws when handling RFC 1964 tokens (bnc#886016)
689
krb5-1.12-CVE-2014-4341-CVE-2014-4342.patch
690
- start krb5kdc after slapd (bnc#886102)
691
692
-------------------------------------------------------------------
693
Fri Jun 6 11:08:08 UTC 2014 - ckornacker@suse.com
694
695
- obsolete krb5-plugin-preauth-pkinit-nss (bnc#881674)
696
similar functionality is provided by krb5-plugin-preauth-pkinit
697
698
-------------------------------------------------------------------
699
Tue Feb 18 15:25:57 UTC 2014 - ckornacker@suse.com
700
701
- don't deliver SysV init files to systemd distributions
702
703
-------------------------------------------------------------------
704
Tue Jan 21 14:23:37 UTC 2014 - ckornacker@suse.com
705
706
- update to version 1.12.1
707
* Make KDC log service principal names more consistently during
708
some error conditions, instead of "<unknown server>"
709
* Fix several bugs related to building AES-NI support on less
710
common configurations
711
* Fix several bugs related to keyring credential caches
712
- upstream obsoletes:
713
krb5-1.12-copy_context.patch
714
krb5-1.12-enable-NX.patch
715
krb5-1.12-pic-aes-ni.patch
716
krb5-master-no-malloc0.patch
717
krb5-master-ignore-empty-unnecessary-final-token.patch
718
krb5-master-gss_oid_leak.patch
719
krb5-master-keytab_close.patch
720
krb5-master-spnego_error_messages.patch
721
- Fix Get time offsets for all keyring ccaches
722
krb5-master-keyring-kdcsync.patch (RT#7820)
723
724
-------------------------------------------------------------------
725
Mon Jan 13 15:37:16 UTC 2014 - ckornacker@suse.com
726
727
- update to version 1.12
728
* Add GSSAPI extensions for constructing MIC tokens using IOV lists
729
* Add a FAST OTP preauthentication module for the KDC which uses
730
RADIUS to validate OTP token values.
731
* The AES-based encryption types will use AES-NI instructions
732
when possible for improved performance.
733
- revert dependency on libcom_err-mini-devel since it's not yet
734
available
735
- update and rebase patches
736
* krb5-1.10-buildconf.patch -> krb5-1.12-buildconf.patch
737
* krb5-1.11-pam.patch -> krb5-1.12-pam.patch
738
* krb5-1.11-selinux-label.patch -> krb5-1.12-selinux-label.patch
739
* krb5-1.8-api.patch -> krb5-1.12-api.patch
740
* krb5-1.9-ksu-path.patch -> krb5-1.12-ksu-path.patch
741
* krb5-1.9-debuginfo.patch
742
* krb5-1.9-kprop-mktemp.patch
743
* krb5-kvno-230379.patch
744
- added upstream patches
745
- Fix krb5_copy_context
746
* krb5-1.12-copy_context.patch
747
- Mark AESNI files as not needing executable stacks
748
* krb5-1.12-enable-NX.patch
749
* krb5-1.12-pic-aes-ni.patch
750
- Fix memory leak in SPNEGO initiator
751
* krb5-master-gss_oid_leak.patch
752
- Fix SPNEGO one-hop interop against old IIS
753
* krb5-master-ignore-empty-unnecessary-final-token.patch
754
- Fix GSS krb5 acceptor acquire_cred error handling
755
* krb5-master-keytab_close.patch
756
- Avoid malloc(0) in SPNEGO get_input_token
757
* krb5-master-no-malloc0.patch
758
- Test SPNEGO error message in t_s4u.py
759
* krb5-master-spnego_error_messages.patch
760
761
-------------------------------------------------------------------
762
Tue Dec 10 02:43:32 UTC 2013 - nfbrown@suse.com
763
764
- Reduce build dependencies for krb5-mini by removing
765
doxygen and changing libcom_err-devel to
766
libcom_err-mini-devel
767
- Small fix to pre_checkin.sh so krb5-mini.spec is correct.
768
769
-------------------------------------------------------------------
770
Fri Nov 15 13:33:53 UTC 2013 - ckornacker@suse.com
771
772
- update to version 1.11.4
773
- Fix a KDC null pointer dereference [CVE-2013-1417] that could
774
affect realms with an uncommon configuration.
775
- Fix a KDC null pointer dereference [CVE-2013-1418] that could
776
affect KDCs that serve multiple realms.
777
- Fix a number of bugs related to KDC master key rollover.
778
779
-------------------------------------------------------------------
780
Mon Jun 24 16:21:07 UTC 2013 - mc@suse.com
781
782
- install and enable systemd service files also in -mini package
783
784
-------------------------------------------------------------------
785
Fri Jun 21 02:12:03 UTC 2013 - crrodriguez@opensuse.org
786
787
- remove fstack-protector-all from CFLAGS, just use the
788
lighter/fast version already present in %optflags
789
790
- Use LFS_CFLAGS to build in 32 bit archs.
791
792
-------------------------------------------------------------------
793
Sun Jun 9 14:14:48 UTC 2013 - mc@suse.com
794
795
- update to version 1.11.3
796
- Fix a UDP ping-pong vulnerability in the kpasswd
797
(password changing) service. [CVE-2002-2443]
798
- Improve interoperability with some Windows native PKINIT clients.
799
- install translation files
800
- remove outdated configure options
801
802
-------------------------------------------------------------------
803
Tue May 28 17:08:01 UTC 2013 - mc@suse.com
804
805
- cleanup systemd files (remove syslog.target)
806
807
-------------------------------------------------------------------
808
Fri May 3 09:43:47 CEST 2013 - mc@suse.de
809
810
- let krb5-mini conflict with all main packages
811
812
-------------------------------------------------------------------
813
Thu May 2 16:43:16 CEST 2013 - mc@suse.de
814
815
- add conflicts between krb5-mini and krb5-server
816
817
-------------------------------------------------------------------
818
Sun Apr 28 17:14:36 CEST 2013 - mc@suse.de
819
820
- update to version 1.11.2
821
* Incremental propagation could erroneously act as if a slave's
822
database were current after the slave received a full dump
823
that failed to load.
824
* gss_import_sec_context incorrectly set internal state that
825
identifies whether an imported context is from an interposer
826
mechanism or from the underlying mechanism.
827
- upstream fix obsolete krb5-lookup_etypes-leak.patch
828
829
-------------------------------------------------------------------
830
Thu Apr 4 15:10:19 CEST 2013 - mc@suse.de
831
832
- add conflicts between krb5-mini-devel and krb5-devel
833
834
-------------------------------------------------------------------
835
Tue Apr 2 17:32:08 CEST 2013 - mc@suse.de
836
837
- add conflicts between krb5-mini and krb5 and krb5-client
838
839
-------------------------------------------------------------------
840
Wed Mar 27 11:36:00 CET 2013 - mc@suse.de
841
842
- enable selinux and set openssl as crypto implementation
843
844
-------------------------------------------------------------------
845
Fri Mar 22 10:34:55 CET 2013 - mc@suse.de
846
847
- fix path to executables in service files
848
(bnc#810926)
849
850
-------------------------------------------------------------------
851
Fri Mar 15 11:14:21 CET 2013 - mc@suse.de
852
853
- update to version 1.11.1
854
* Improve ASN.1 support code, making it table-driven for
855
decoding as well as encoding
856
* Refactor parts of KDC
857
* Documentation consolidation
858
* build docs in the main package
859
* bugfixing
860
- changes of patches:
861
* bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif:
862
upstream
863
* bug-807556-CVE-2012-1016-fix-PKINIT-null-pointer-deref2.dif:
864
upstream
865
* krb5-1.10-gcc47.patch: upstream
866
* krb5-1.10-selinux-label.patch replaced by
867
krb5-1.11-selinux-label.patch
868
* krb5-1.10-spin-loop.patch: upstream
869
* krb5-1.3.5-perlfix.dif: the tool was removed from upstream
870
* krb5-1.8-pam.patch replaced by
871
krb5-1.11-pam.patch
872
873
-------------------------------------------------------------------
874
Wed Mar 6 12:01:32 CET 2013 - mc@suse.de
875
876
- fix PKINIT null pointer deref in pkinit_check_kdc_pkid()
877
CVE-2012-1016 (bnc#807556)
878
bug-807556-CVE-2012-1016-fix-PKINIT-null-pointer-deref2.dif
879
880
-------------------------------------------------------------------
881
Mon Mar 4 11:23:10 CET 2013 - mc@suse.de
882
883
- fix PKINIT null pointer deref
884
CVE-2013-1415 (bnc#806715)
885
bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif
886
887
-------------------------------------------------------------------
888
Fri Jan 25 15:29:37 CET 2013 - mc@suse.de
889
890
- package missing file (bnc#794784)
891
892
-------------------------------------------------------------------
893
Tue Jan 22 13:55:52 UTC 2013 - lchiquitto@suse.com
894
895
- krb5-1.10-spin-loop.patch: fix spin-loop bug in k5_sendto_kdc
896
(bnc#793336)
897
898
-------------------------------------------------------------------
899
Tue Oct 16 19:35:47 UTC 2012 - coolo@suse.com
900
901
- revert the -p usage in %postun to fix SLE build
902
903
-------------------------------------------------------------------
904
Tue Oct 16 12:05:00 UTC 2012 - coolo@suse.com
905
906
- buildrequire systemd by pkgconfig provide to get systemd-mini
907
908
-------------------------------------------------------------------
909
Sat Oct 13 16:50:59 UTC 2012 - coolo@suse.com
910
911
- do not require systemd in krb5-mini
912
913
-------------------------------------------------------------------
914
Fri Oct 5 15:50:38 CEST 2012 - mc@suse.de
915
916
- add systemd service files for kadmind, krb5kdc and kpropd
917
- add sysconfig templates for kadmind and krb5kdc
918
919
-------------------------------------------------------------------
920
Wed Jun 13 08:40:56 UTC 2012 - coolo@suse.com
921
922
- fix %files section for krb5-mini
923
924
-------------------------------------------------------------------
925
Thu Jun 7 11:39:18 UTC 2012 - mc@suse.de
926
927
- fix gcc47 issues
928
929
-------------------------------------------------------------------
930
Wed Jun 6 16:25:41 CEST 2012 - mc@suse.de
931
932
- update to version 1.10.2
933
obsolte patches:
934
* krb5-1.7-nodeplibs.patch
935
* krb5-1.9.1-ai_addrconfig.patch
936
* krb5-1.9.1-ai_addrconfig2.patch
937
* krb5-1.9.1-sendto_poll.patch
938
* krb5-1.9-canonicalize-fallback.patch
939
* krb5-1.9-paren.patch
940
* krb5-klist_s.patch
941
* krb5-pkinit-cms2.patch
942
* krb5-trunk-chpw-err.patch
943
* krb5-trunk-gss_delete_sec.patch
944
* krb5-trunk-kadmin-oldproto.patch
945
* krb5-1.9-MITKRB5-SA-2011-006.dif
946
* krb5-1.9-gss_display_status-iakerb.patch
947
* krb5-1.9.1-sendto_poll2.patch
948
* krb5-1.9.1-sendto_poll3.patch
949
* krb5-1.9-MITKRB5-SA-2011-007.dif
950
- Fix an interop issue with Windows Server 2008 R2 Read-Only Domain
951
Controllers.
952
- Update a workaround for a glibc bug that would cause DNS PTR queries
953
to occur even when rdns = false.
954
- Fix a kadmind denial of service issue (null pointer dereference),
955
which could only be triggered by an administrator with the "create"
956
privilege. [CVE-2012-1013]
957
- Fix access controls for KDB string attributes [CVE-2012-1012]
958
- Make the ASN.1 encoding of key version numbers interoperate with
959
Windows Read-Only Domain Controllers
960
- Avoid generating spurious password expiry warnings in cases where
961
the KDC sends an account expiry time without a password expiry time
962
- Make PKINIT work with FAST in the client library.
963
- Add the DIR credential cache type, which can hold a collection of
964
credential caches.
965
- Enhance kinit, klist, and kdestroy to support credential cache
966
collections if the cache type supports it.
967
- Add the kswitch command, which changes the selected default cache
968
within a collection.
969
- Add heuristic support for choosing client credentials based on
970
the service realm.
971
- Add support for $HOME/.k5identity, which allows credential
972
choice based on configured rules.
973
974
-------------------------------------------------------------------
975
Sun Feb 26 22:23:15 UTC 2012 - stefan.bruens@rwth-aachen.de
976
977
- add autoconf macro to devel subpackage
978
979
-------------------------------------------------------------------
980
Tue Jan 31 15:33:05 CET 2012 - meissner@suse.de
981
982
- fix license in krb5-mini
983
984
-------------------------------------------------------------------
985
Tue Dec 20 20:57:26 UTC 2011 - coolo@suse.com
986
987
- add autoconf as buildrequire to avoid implicit dependency
988
989
-------------------------------------------------------------------
990
Tue Dec 20 11:01:39 UTC 2011 - coolo@suse.com
991
992
- remove call to suse_update_config, very old work around
993
994
-------------------------------------------------------------------
995
Mon Nov 21 11:24:12 CET 2011 - mc@suse.de
996
997
- fix KDC null pointer dereference in TGS handling
998
(MITKRB5-SA-2011-007, bnc#730393)
999
CVE-2011-1530
1000
1001
-------------------------------------------------------------------
1002
Mon Nov 21 11:11:54 CET 2011 - mc@suse.de
1003
1004
- fix KDC HA feature introduced with implementing KDC poll
1005
(RT#6951, bnc#731648)
1006
1007
-------------------------------------------------------------------
1008
Fri Nov 18 08:35:52 UTC 2011 - rhafer@suse.de
1009
1010
- fix minor error messages for the IAKERB GSSAPI mechanism
1011
(see: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7020)
1012
1013
-------------------------------------------------------------------
1014
Mon Oct 17 16:11:03 CEST 2011 - mc@suse.de
1015
1016
- fix kdc remote denial of service
1017
(MITKRB5-SA-2011-006, bnc#719393)
1018
CVE-2011-1527, CVE-2011-1528, CVE-2011-1529
1019
1020
-------------------------------------------------------------------
1021
Tue Aug 23 13:52:03 CEST 2011 - mc@suse.de
1022
1023
- use --without-pam to build krb5-mini
1024
1025
-------------------------------------------------------------------
1026
Sun Aug 21 09:37:01 UTC 2011 - mc@novell.com
1027
1028
- add patches from Fedora and upstream
1029
- fix init scripts (bnc#689006)
1030
1031
-------------------------------------------------------------------
1032
Fri Aug 19 15:48:35 UTC 2011 - mc@novell.com
1033
1034
- update to version 1.9.1
1035
* obsolete patches:
1036
MITKRB5-SA-2010-007-1.8.dif
1037
krb5-1.8-MITKRB5-SA-2010-006.dif
1038
krb5-1.8-MITKRB5-SA-2011-001.dif
1039
krb5-1.8-MITKRB5-SA-2011-002.dif
1040
krb5-1.8-MITKRB5-SA-2011-003.dif
1041
krb5-1.8-MITKRB5-SA-2011-004.dif
1042
krb5-1.4.3-enospc.dif
1043
* replace krb5-1.6.1-compile_pie.dif
1044
-------------------------------------------------------------------
1045
Thu Apr 14 11:33:18 CEST 2011 - mc@suse.de
1046
1047
- fix kadmind invalid pointer free()
1048
(MITKRB5-SA-2011-004, bnc#687469)
1049
CVE-2011-0285
1050
1051
-------------------------------------------------------------------
1052
Tue Mar 1 12:43:22 CET 2011 - mc@suse.de
1053
1054
- Fix vulnerability to a double-free condition in KDC daemon
1055
(MITKRB5-SA-2011-003, bnc#671717)
1056
CVE-2011-0284
1057
1058
-------------------------------------------------------------------
1059
Wed Jan 19 14:42:27 CET 2011 - mc@suse.de
1060
1061
- Fix kpropd denial of service
1062
(MITKRB5-SA-2011-001, bnc#662665)
1063
CVE-2010-4022
1064
- Fix KDC denial of service attacks with LDAP back end
1065
(MITKRB5-SA-2011-002, bnc#663619)
1066
CVE-2011-0281, CVE-2011-0282
1067
1068
-------------------------------------------------------------------
1069
Wed Dec 1 11:44:15 CET 2010 - mc@suse.de
1070
1071
- Fix multiple checksum handling vulnerabilities
1072
(MITKRB5-SA-2010-007, bnc#650650)
1073
CVE-2010-1324
1074
* krb5 GSS-API applications may accept unkeyed checksums
1075
* krb5 application services may accept unkeyed PAC checksums
1076
* krb5 KDC may accept low-entropy KrbFastArmoredReq checksums
1077
CVE-2010-1323
1078
* krb5 clients may accept unkeyed SAM-2 challenge checksums
1079
* krb5 may accept KRB-SAFE checksums with low-entropy derived keys
1080
CVE-2010-4020
1081
* krb5 may accept authdata checksums with low-entropy derived keys
1082
CVE-2010-4021
1083
* krb5 KDC may issue unrequested tickets due to KrbFastReq forgery
1084
1085
-------------------------------------------------------------------
1086
Thu Oct 28 12:53:13 CEST 2010 - mc@suse.de
1087
1088
- fix csh profile (bnc#649856)
1089
1090
-------------------------------------------------------------------
1091
Fri Oct 22 11:15:43 CEST 2010 - mc@suse.de
1092
1093
- update to krb5-1.8.3
1094
* remove patches which are now upstrem
1095
- krb5-1.7-MITKRB5-SA-2010-004.dif
1096
- krb5-1.8.1-gssapi-error-table.dif
1097
- krb5-MITKRB5-SA-2010-005.dif
1098
1099
-------------------------------------------------------------------
1100
Fri Oct 22 10:49:11 CEST 2010 - mc@suse.de
1101
1102
- change environment variable PATH directly for csh
1103
(bnc#642080)
1104
1105
-------------------------------------------------------------------
1106
Mon Sep 27 11:42:43 CEST 2010 - mc@suse.de
1107
1108
- fix a dereference of an uninitialized pointer while processing
1109
authorization data.
1110
CVE-2010-1322, MITKRB5-SA-2010-006 (bnc#640990)
1111
1112
-------------------------------------------------------------------
1113
Mon Jun 21 21:31:53 UTC 2010 - lchiquitto@novell.com
1114
1115
- add correct error table when initializing gss-krb5 (bnc#606584,
1116
bnc#608295)
1117
1118
-------------------------------------------------------------------
1119
Wed May 19 14:27:19 CEST 2010 - mc@suse.de
1120
1121
- fix GSS-API library null pointer dereference
1122
CVE-2010-1321, MITKRB5-SA-2010-005 (bnc#596826)
1123
1124
-------------------------------------------------------------------
1125
Wed Apr 14 11:36:32 CEST 2010 - mc@suse.de
1126
1127
- fix a double free vulnerability in the KDC
1128
CVE-2010-1320, MITKRB5-SA-2010-004 (bnc#596002)
1129
1130
-------------------------------------------------------------------
1131
Fri Apr 9 12:43:44 CEST 2010 - mc@suse.de
1132
1133
- update to version 1.8.1
1134
* include krb5-1.8-POST.dif
1135
* include MITKRB5-SA-2010-002
1136
1137
-------------------------------------------------------------------
1138
Tue Apr 6 14:14:56 CEST 2010 - mc@suse.de
1139
1140
- update krb5-1.8-POST.dif
1141
1142
-------------------------------------------------------------------
1143
Tue Mar 23 14:32:41 CET 2010 - mc@suse.de
1144
1145
- fix a bug where an unauthenticated remote attacker could cause
1146
a GSS-API application including the Kerberos administration
1147
daemon (kadmind) to crash.
1148
CVE-2010-0628, MITKRB5-SA-2010-002 (bnc#582557)
1149
1150
-------------------------------------------------------------------
1151
Tue Mar 23 12:33:26 CET 2010 - mc@suse.de
1152
1153
- add post 1.8 fixes
1154
* Add IPv6 support to changepw.c
1155
* fix two problems in kadm5_get_principal mask handling
1156
* Ignore improperly encoded signedpath AD elements
1157
* handle NT_SRV_INST in service principal referrals
1158
* dereference options while checking
1159
KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT
1160
* Fix the kpasswd fallback from the ccache principal name
1161
* Document the ticket_lifetime libdefaults setting
1162
* Change KRB5_AUTHDATA_SIGNTICKET from 142 to 512
1163
1164
-------------------------------------------------------------------
1165
Thu Mar 4 10:42:29 CET 2010 - mc@suse.de
1166
1167
- update to version 1.8
1168
* Increase code quality
1169
* Move toward improved KDB interface
1170
* Investigate and remedy repeatedly-reported performance
1171
bottlenecks.
1172
* Reduce DNS dependence by implementing an interface that allows
1173
client library to track whether a KDC supports service
1174
principal referrals.
1175
* Disable DES by default
1176
* Account lockout for repeated login failures
1177
* Bridge layer to allow Heimdal HDB modules to act as KDB
1178
backend modules
1179
* FAST enhancements
1180
* Microsoft Services for User (S4U) compatibility
1181
* Anonymous PKINIT
1182
- fix KDC denial of service
1183
CVE-2010-0283, MITKRB5-SA-2010-001 (bnc#571781)
1184
- fix KDC denial of service in cross-realm referral processing
1185
CVE-2009-3295, MITKRB5-SA-2009-003 (bnc#561347)
1186
- fix integer underflow in AES and RC4 decryption
1187
CVE-2009-4212, MITKRB5-SA-2009-004 (bnc#561351)
1188
- moved krb5 applications (telnet, ftp, rlogin, ...) to krb5-appl
1189
1190
-------------------------------------------------------------------
1191
Mon Dec 14 16:32:01 CET 2009 - jengelh@medozas.de
1192
1193
- add baselibs.conf as a source
1194
1195
-------------------------------------------------------------------
1196
Fri Nov 13 16:51:37 CET 2009 - mc@suse.de
1197
1198
- enhance '$PATH' only if the directories are available
1199
and not empty (bnc#544949)
1200
1201
-------------------------------------------------------------------
1202
Sun Jul 12 21:36:17 CEST 2009 - coolo@novell.com
1203
1204
- readd lost baselibs.conf
1205
1206
-------------------------------------------------------------------
1207
Wed Jun 3 10:23:42 CEST 2009 - mc@suse.de
1208
1209
- update to final 1.7 release
1210
1211
-------------------------------------------------------------------
1212
Wed May 13 11:30:42 CEST 2009 - mc@suse.de
1213
1214
- update to version 1.7 Beta2
1215
* Incremental propagation support for the KDC database.
1216
* Flexible Authentication Secure Tunneling (FAST), a preauthentiation
1217
framework that can protect the AS exchange from dictionary attack.
1218
* Implement client and KDC support for GSS_C_DELEG_POLICY_FLAG, which
1219
allows a GSS application to request credential delegation only if
1220
permitted by KDC policy.
1221
* Fix CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847 --
1222
various vulnerabilities in SPNEGO and ASN.1 code.
1223
1224
-------------------------------------------------------------------
1225
Mon Feb 16 13:04:26 CET 2009 - mc@suse.de
1226
1227
- update to pre 1.7 version
1228
* Remove support for version 4 of the Kerberos protocol (krb4).
1229
* New libdefaults configuration variable "allow_weak_crypto".
1230
* Client library now follows client principal referrals, for
1231
compatibility with Windows.
1232
* KDC can issue realm referrals for service principals based on domain
1233
names.
1234
* Encryption algorithm negotiation (RFC 4537).
1235
* In the replay cache, use a hash over the complete ciphertext to
1236
avoid false-positive replay indications.
1237
* Microsoft GSS_WrapEX, implemented using the gss_iov API, which is
1238
similar to the equivalent SSPI functionality.
1239
* DCE RPC, including three-leg GSS context setup and unencapsulated
1240
GSS tokens.
1241
* NTLM recognition support in GSS-API, to facilitate dropping in an
1242
NTLM implementation.
1243
* KDC support for principal aliases, if the back end supports them.
1244
* Microsoft set/change password (RFC 3244) protocol in kadmind.
1245
* Master key rollover support.
1246
1247
-------------------------------------------------------------------
1248
Wed Jan 14 09:21:36 CET 2009 - olh@suse.de
1249
1250
- obsolete also old heimdal-lib-XXbit and heimdal-devel-XXbit
1251
1252
-------------------------------------------------------------------
1253
Thu Dec 11 14:12:57 CET 2008 - mc@suse.de
1254
1255
- do not query IPv6 addresses if no IPv6 address exists on this host
1256
[bnc#449143]
1257
1258
-------------------------------------------------------------------
1259
Wed Dec 10 12:34:56 CET 2008 - olh@suse.de
1260
1261
- use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade
1262
(bnc#437293)
1263
1264
-------------------------------------------------------------------
1265
Thu Oct 30 12:34:56 CET 2008 - olh@suse.de
1266
1267
- obsolete old -XXbit packages (bnc#437293)
1268
1269
-------------------------------------------------------------------
1270
Fri Sep 26 18:13:19 CEST 2008 - mc@suse.de
1271
1272
- in case we use ldap as database backend, ldap should be
1273
started before krb5kdc
1274
1275
-------------------------------------------------------------------
1276
Mon Jul 28 10:43:29 CEST 2008 - mc@suse.de
1277
1278
- add new fixes to post 1.6.3 patch
1279
* fix mem leak in krb5_gss_accept_sec_context()
1280
* keep minor_status
1281
* kadm5_decrypt_key: A ktype of -1 is documented as meaning
1282
"to be ignored"
1283
* Reject socket fds > FD_SETSIZE
1284
1285
-------------------------------------------------------------------
1286
Fri Jul 25 12:13:24 CEST 2008 - mc@suse.de
1287
1288
- add patches from SVN post 1.6.3
1289
* krb5_string_to_keysalts: Fix an infinite loop
1290
* fix some mutex issues
1291
* better recovery from corrupt rcache files
1292
* some more small fixes
1293
1294
-------------------------------------------------------------------
1295
Wed Jun 18 15:30:18 CEST 2008 - mc@suse.de
1296
1297
- add case-insensitive.dif (FATE#300771)
1298
- minor fixes for ktutil man page
1299
- reduce rpmlint warnings
1300
1301
-------------------------------------------------------------------
1302
Wed May 14 17:44:59 CEST 2008 - mc@suse.de
1303
1304
- Fall back to TCP on kdc-unresolvable/unreachable errors.
1305
- restore valid sequence number before generating requests
1306
(fix changing passwords in mixed ipv4/ipv6 enviroments)
1307
1308
-------------------------------------------------------------------
1309
Thu Apr 10 12:54:45 CEST 2008 - ro@suse.de
1310
1311
- added baselibs.conf file to build xxbit packages
1312
for multilib support
1313
1314
-------------------------------------------------------------------
1315
Wed Apr 9 12:04:48 CEST 2008 - mc@suse.de
1316
1317
- modify krb5-config to not output rpath and cflags in --libs
1318
(bnc#378270)
1319
1320
-------------------------------------------------------------------
1321
Fri Mar 14 11:27:55 CET 2008 - mc@suse.de
1322
1323
- fix two security bugs:
1324
* MITKRB5-SA-2008-001(CVE-2008-0062, CVE-2008-0063)
1325
fix double free [bnc#361373]
1326
* MITKRB5-SA-2008-002(CVE-2008-0947, CVE-2008-0948)
1327
Memory corruption while too many open file descriptors
1328
[bnc#363151]
1329
- change default config file. Comment out the examples.
1330
1331
-------------------------------------------------------------------
1332
Fri Dec 14 10:48:52 CET 2007 - mc@suse.de
1333
1334
- fix several security bugs:
1335
* CVE-2007-5894 apparent uninit length
1336
* CVE-2007-5902 integer overflow
1337
* CVE-2007-5971 free of non-heap pointer and double-free
1338
* CVE-2007-5972 double fclose()
1339
[#346745, #346748, #346746, #346749, #346747]
1340
1341
-------------------------------------------------------------------
1342
Tue Dec 4 16:36:07 CET 2007 - mc@suse.de
1343
1344
- improve GSSAPI error messages
1345
1346
-------------------------------------------------------------------
1347
Tue Nov 6 13:53:17 CET 2007 - mc@suse.de
1348
1349
- add coreutils to PreReq
1350
1351
-------------------------------------------------------------------
1352
Tue Oct 23 10:24:25 CEST 2007 - mc@suse.de
1353
1354
- update to krb5 version 1.6.3
1355
* fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow
1356
* fix CVE-2007-4000 modify_policy vulnerability
1357
* Add PKINIT support
1358
- remove patches which are upstream now
1359
- enhance init scripts and xinetd profiles
1360
1361
-------------------------------------------------------------------
1362
Fri Sep 14 12:08:55 CEST 2007 - mc@suse.de
1363
1364
- update krb5-1.6.2-post.dif
1365
* If a KDC returns KDC_ERR_SVC_UNAVAILABLE, it appears that
1366
that the client library will not failover to the next KDC.
1367
[#310540]
1368
1369
-------------------------------------------------------------------
1370
Tue Sep 11 15:09:14 CEST 2007 - mc@suse.de
1371
1372
- update krb5-1.6.2-post.dif
1373
* new -S sname option for kvno
1374
* read_entropy_from_device on partial read will not fill buffer
1375
* Bail out if encoded "ticket" doesn't decode correctly.
1376
* patch for referrals loop
1377
1378
-------------------------------------------------------------------
1379
Thu Sep 6 10:43:39 CEST 2007 - mc@suse.de
1380
1381
- fix a problem with the originally published patch
1382
for MITKRB5-SA-2007-006 - CVE-2007-3999
1383
[#302377]
1384
1385
-------------------------------------------------------------------
1386
Wed Sep 5 12:18:21 CEST 2007 - mc@suse.de
1387
1388
- fix execute arbitrary code
1389
(MITKRB5-SA-2007-006 - CVE-2007-3999,2007-4000)
1390
[#302377]
1391
1392
-------------------------------------------------------------------
1393
Tue Aug 7 11:56:41 CEST 2007 - mc@suse.de
1394
1395
- add krb5-1.6.2-post.dif
1396
* during the referrals loop, check to see if the
1397
session key enctype of a returned credential for the final
1398
service is among the enctypes explicitly selected by the
1399
application, and retry with old_use_conf_ktypes if it is not.
1400
* If mkstemp() is available, the new ccache file gets created but
1401
the subsequent open(O_CREAT|O_EXCL) call fails because the file
1402
was already created by mkstemp(). Apply patch from Apple to keep
1403
the file descriptor open.
1404
1405
-------------------------------------------------------------------
1406
Thu Jul 12 17:01:28 CEST 2007 - mc@suse.de
1407
1408
- update to version 1.6.2
1409
- remove krb5-1.6.1-post.dif all fixes are included in this release
1410
1411
-------------------------------------------------------------------
1412
Thu Jul 5 18:10:28 CEST 2007 - mc@suse.de
1413
1414
- change requires to libcom_err-devel
1415
1416
-------------------------------------------------------------------
1417
Mon Jul 2 11:26:47 CEST 2007 - mc@suse.de
1418
1419
- update krb5-1.6.1-post.dif
1420
* fix leak in krb5_walk_realm_tree
1421
* rd_req_decoded needs to deal with referral realms
1422
* fix buffer overflow in kadmind
1423
(MITKRB5-SA-2007-005 - CVE-2007-2798)
1424
[#278689]
1425
* fix kadmind code execution bug
1426
(MITKRB5-SA-2007-004 - CVE-2007-2442 - CVE-2007-2443)
1427
[#271191]
1428
1429
-------------------------------------------------------------------
1430
Thu Jun 14 17:44:12 CEST 2007 - mc@suse.de
1431
1432
- fix unstripped-binary-or-object rpmlint warning
1433
1434
-------------------------------------------------------------------
1435
Mon Jun 11 18:04:23 CEST 2007 - sschober@suse.de
1436
1437
- fixing rpmlint warnings and errors:
1438
* merged logrotate scripts kadmin and krb5kdc into a single file
1439
krb5-server.
1440
* moved heimdal2mit-DumpConvert.pl and simple_convert_krb5conf.pl
1441
from /usr/share/doc/packages/krb5 to /usr/lib/mit/helper.
1442
adapted krb5.spec and README.ConvertHeimdalMIT accordingly.
1443
* added surpression filter for
1444
"devel-file-in-non-devel-package /usr/lib/libgssapi_krb5.so"
1445
(see [#147912]).
1446
* set default runlevel of init scripts in chkconfig line to 3 and
1447
5
1448
1449
-------------------------------------------------------------------
1450
Wed May 9 15:30:53 CEST 2007 - mc@suse.de
1451
1452
- fix uninitialized salt length
1453
- add extra check for keytab file
1454
1455
-------------------------------------------------------------------
1456
Thu May 3 12:11:29 CEST 2007 - mc@suse.de
1457
1458
- adding krb5-1.6.1-post.dif
1459
* fix segfault in krb5_get_init_creds_password
1460
* remove debug output in ftp client
1461
* profile stores empty string values without double quotes
1462
1463
-------------------------------------------------------------------
1464
Mon Apr 23 11:15:10 CEST 2007 - mc@suse.de
1465
1466
- update to final 1.6.1 version
1467
1468
-------------------------------------------------------------------
1469
Wed Apr 18 14:48:03 CEST 2007 - mc@suse.de
1470
1471
- add plugin directories to main package
1472
1473
-------------------------------------------------------------------
1474
Mon Apr 16 14:38:08 CEST 2007 - mc@suse.de
1475
1476
- update to version 1.6.1 Beta1
1477
- remove obsolete patches
1478
(krb5-1.6-post.dif, krb5-1.6-patchlevel.dif)
1479
- rework compile_pie patch
1480
1481
-------------------------------------------------------------------
1482
Wed Apr 11 10:58:09 CEST 2007 - mc@suse.de
1483
1484
- update krb5-1.6-post.dif
1485
* fix kadmind stack overflow in krb5_klog_syslog
1486
(MITKRB5-SA-2007-002 - CVE-2007-0957)
1487
[#253548]
1488
* fix double free attack in the RPC library
1489
(MITKRB5-SA-2007-003 - CVE-2007-1216)
1490
[#252487]
1491
* fix krb5 telnetd login injection
1492
(MIT-SA-2007-001 - CVE-2007-0956)
1493
#247765
1494
1495
-------------------------------------------------------------------
1496
Thu Mar 29 12:41:57 CEST 2007 - mc@suse.de
1497
1498
- add ncurses-devel and bison to BuildRequires
1499
- rework some patches
1500
1501
-------------------------------------------------------------------
1502
Mon Mar 5 11:01:20 CET 2007 - mc@suse.de
1503
1504
- move SuSEFirewall service definitions to
1505
/etc/sysconfig/SuSEfirewall2.d/services
1506
1507
-------------------------------------------------------------------
1508
Thu Feb 22 11:13:48 CET 2007 - mc@suse.de
1509
1510
- add firewall definition to krb5-server, FATE #300687
1511
1512
-------------------------------------------------------------------
1513
Mon Feb 19 13:59:43 CET 2007 - mc@suse.de
1514
1515
- update krb5-1.6-post.dif
1516
- move some applications into the right package
1517
1518
-------------------------------------------------------------------
1519
Fri Feb 9 13:31:22 CET 2007 - mc@suse.de
1520
1521
- update krb5-1.6-post.dif
1522
1523
-------------------------------------------------------------------
1524
Mon Jan 29 11:27:23 CET 2007 - mc@suse.de
1525
1526
- krb5-1.6-fix-passwd-tcp.dif and krb5-1.6-fix-sendto_kdc-memset.dif
1527
are now upstream. Remove patches.
1528
- fix leak in krb5_kt_resolve and krb5_kt_wresolve
1529
1530
-------------------------------------------------------------------
1531
Tue Jan 23 17:21:12 CET 2007 - mc@suse.de
1532
1533
- fix "local variable used before set" in ftp.c
1534
[#237684]
1535
1536
-------------------------------------------------------------------
1537
Mon Jan 22 16:39:27 CET 2007 - mc@suse.de
1538
1539
- krb5-devel should require keyutils-devel
1540
1541
-------------------------------------------------------------------
1542
Mon Jan 22 12:19:49 CET 2007 - mc@suse.de
1543
1544
- update to version 1.6
1545
* Major changes in 1.6 include
1546
* Partial client implementation to handle server name referrals.
1547
* Pre-authentication plug-in framework, donated by Red Hat.
1548
* LDAP KDB plug-in, donated by Novell.
1549
- remove obsolete patches
1550
1551
-------------------------------------------------------------------
1552
Wed Jan 10 11:16:30 CET 2007 - mc@suse.de
1553
1554
- fix for
1555
kadmind (via RPC library) calls uninitialized function pointer
1556
(CVE-2006-6143)(Bug #225990)
1557
krb5-1.5-MITKRB5-SA-2006-002-fix-code-exec.dif
1558
- fix for
1559
kadmind (via GSS-API mechglue) frees uninitialized pointers
1560
(CVE-2006-6144)(Bug #225992)
1561
krb5-1.5-MITKRB5-SA-2006-003-fix-free-of-uninitialized-pointer.dif
1562
1563
-------------------------------------------------------------------
1564
Tue Jan 2 14:53:33 CET 2007 - mc@suse.de
1565
1566
- Fix Requires in krb5-devel
1567
[Bug #231008]
1568
1569
-------------------------------------------------------------------
1570
Mon Nov 6 11:49:39 CET 2006 - mc@suse.de
1571
1572
- fix "local variable used before set" [#217692]
1573
- fix strncat warning
1574
1575
-------------------------------------------------------------------
1576
Fri Oct 27 17:34:30 CEST 2006 - mc@suse.de
1577
1578
- add a default kadm5.dict file
1579
- require $network on daemon start
1580
1581
-------------------------------------------------------------------
1582
Wed Sep 13 10:39:41 CEST 2006 - mc@suse.de
1583
1584
- fix function call with too few arguments [#203837]
1585
1586
-------------------------------------------------------------------
1587
Thu Aug 24 12:52:25 CEST 2006 - mc@suse.de
1588
1589
- update to version 1.5.1
1590
- remove obsolete patches which are now included upstream
1591
* krb5-1.4.3-MITKRB5-SA-2006-001-setuid-return-checks.dif
1592
* trunk-fix-uninitialized-vars.dif
1593
1594
-------------------------------------------------------------------
1595
Fri Aug 11 14:29:27 CEST 2006 - mc@suse.de
1596
1597
- krb5 setuid return check fixes
1598
krb5-1.4.3-MITKRB5-SA-2006-001-setuid-return-checks.dif
1599
[#182351]
1600
1601
-------------------------------------------------------------------
1602
Mon Aug 7 15:54:26 CEST 2006 - mc@suse.de
1603
1604
- remove update-messages
1605
1606
-------------------------------------------------------------------
1607
Mon Jul 24 15:45:14 CEST 2006 - mc@suse.de
1608
1609
- add check for krb5_prop in services to kpropd init script.
1610
[#192446]
1611
1612
-------------------------------------------------------------------
1613
Mon Jul 3 14:59:35 CEST 2006 - mc@suse.de
1614
1615
- update to version 1.5
1616
* KDB abstraction layer, donated by Novell.
1617
* plug-in architecture, allowing for extension modules to be
1618
loaded at run-time.
1619
* multi-mechanism GSS-API implementation ("mechglue"),
1620
donated by Sun Microsystems
1621
* Simple and Protected GSS-API negotiation mechanism ("SPNEGO")
1622
implementation, donated by Sun Microsystems
1623
- remove obsolete patches and add some new
1624
1625
-------------------------------------------------------------------
1626
Fri May 26 14:50:00 CEST 2006 - ro@suse.de
1627
1628
- libcom is not in e2fsck-devel but in its own package now, change
1629
Requires accordingly.
1630
1631
-------------------------------------------------------------------
1632
Mon Mar 27 14:10:02 CEST 2006 - mc@suse.de
1633
1634
- add all daemons to %stop_on_removal and %restart_on_update
1635
- add reload to kpropd init script
1636
- add force-reload to all init scripts
1637
1638
-------------------------------------------------------------------
1639
Mon Mar 13 18:20:36 CET 2006 - mc@suse.de
1640
1641
- add libgssapi_krb5.so link to main package [#147912]
1642
1643
-------------------------------------------------------------------
1644
Fri Feb 3 18:17:01 CET 2006 - mc@suse.de
1645
1646
- fix logging section for kadmind in convert script
1647
1648
-------------------------------------------------------------------
1649
Wed Jan 25 21:30:24 CET 2006 - mls@suse.de
1650
1651
- converted neededforbuild to BuildRequires
1652
1653
-------------------------------------------------------------------
1654
Fri Jan 13 14:44:24 CET 2006 - mc@suse.de
1655
1656
- change the logging defaults
1657
1658
-------------------------------------------------------------------
1659
Wed Jan 11 12:59:08 CET 2006 - mc@suse.de
1660
1661
- add tools and README for heimdal => MIT update
1662
1663
-------------------------------------------------------------------
1664
Mon Jan 9 14:41:07 CET 2006 - mc@suse.de
1665
1666
- fix build problems, define _GNU_SOURCE
1667
(krb5-1.4.3-set_gnu_source.dif )
1668
1669
-------------------------------------------------------------------
1670
Tue Jan 3 16:00:13 CET 2006 - mc@suse.de
1671
1672
- added "make %{?jobs:-j%jobs}"
1673
1674
-------------------------------------------------------------------
1675
Fri Nov 18 12:12:01 CET 2005 - mc@suse.de
1676
1677
- update to version 1.4.3
1678
* some memmory leaks fixed
1679
* fix for "AS_REP padata has wrong enctype"
1680
* fix for "AS_REP padata missing PA-ETYPE-INFO"
1681
* ... and more
1682
1683
-------------------------------------------------------------------
1684
Wed Nov 2 21:23:32 CET 2005 - dmueller@suse.de
1685
1686
- don't build as root
1687
1688
-------------------------------------------------------------------
1689
Tue Oct 11 17:39:23 CEST 2005 - mc@suse.de
1690
1691
- update to version 1.4.2
1692
- remove some obsolet patches
1693
1694
-------------------------------------------------------------------
1695
Mon Aug 8 16:07:51 CEST 2005 - mc@suse.de
1696
1697
- build with --disable-static
1698
1699
-------------------------------------------------------------------
1700
Thu Aug 4 16:47:43 CEST 2005 - ro@suse.de
1701
1702
- remove devel-static subpackage
1703
1704
-------------------------------------------------------------------
1705
Thu Jun 30 10:12:30 CEST 2005 - mc@suse.de
1706
1707
- better patch for princ_comp problem
1708
1709
-------------------------------------------------------------------
1710
Mon Jun 27 13:34:50 CEST 2005 - mc@suse.de
1711
1712
- update to version 1.4.1
1713
- remove obsolet patches
1714
- krb5-1.4-gcc4.dif
1715
- krb5-1.4-reduce-namespace-polution.dif
1716
- krb5-1.4-VUL-0-telnet.dif
1717
1718
-------------------------------------------------------------------
1719
Thu Jun 23 10:12:54 CEST 2005 - mc@suse.de
1720
1721
- fixed krb5 KDC heap corruption by random free
1722
[#80574, CAN-2005-1174, MITKRB5-SA-2005-002]
1723
- fixed krb5 double free()
1724
[#86768, CAN-2005-1689, MITKRB5-SA-2005-003]
1725
- fix krb5 NULL pointer reference while comparing principals
1726
[#91600]
1727
1728
-------------------------------------------------------------------
1729
Fri Jun 17 17:18:19 CEST 2005 - mc@suse.de
1730
1731
- fix uninitialized variables
1732
- compile with -fPIE/ link with -pie
1733
1734
-------------------------------------------------------------------
1735
Wed Apr 20 15:36:16 CEST 2005 - mc@suse.de
1736
1737
- fixed wrong xinetd files [#77149]
1738
1739
-------------------------------------------------------------------
1740
Fri Apr 8 04:55:55 CEST 2005 - mt@suse.de
1741
1742
- removed krb5-1.4-fix-error_tables.dif patch obsoleted
1743
by libcom_err locking patches
1744
1745
-------------------------------------------------------------------
1746
Thu Apr 7 13:49:37 CEST 2005 - mc@suse.de
1747
1748
- fixed missing descriptions in init files
1749
[#76164, #76165, #76166, #76169]
1750
1751
-------------------------------------------------------------------
1752
Wed Mar 30 18:11:38 CEST 2005 - mc@suse.de
1753
1754
- enhance $PATH via /etc/profile.d/ [#74018]
1755
- remove the "links to important programs"
1756
1757
-------------------------------------------------------------------
1758
Fri Mar 18 11:09:43 CET 2005 - mc@suse.de
1759
1760
- fixed not running converter script [#72854]
1761
1762
-------------------------------------------------------------------
1763
Thu Mar 17 14:15:17 CET 2005 - mc@suse.de
1764
1765
- Fix CAN-2005-0469: Multiple Telnet Client slc_add_reply() Buffer
1766
Overflow
1767
- Fix CAN-2005-0468: Multiple Telnet Client env_opt_add() Buffer
1768
Overflow
1769
[#73618]
1770
1771
-------------------------------------------------------------------
1772
Wed Mar 16 13:10:18 CET 2005 - mc@suse.de
1773
1774
- fixed wrong PreReqs [#73020]
1775
1776
-------------------------------------------------------------------
1777
Tue Mar 15 19:54:58 CET 2005 - mc@suse.de
1778
1779
- add a simple krb5.conf converter [#72854]
1780
1781
-------------------------------------------------------------------
1782
Mon Mar 14 17:08:59 CET 2005 - mc@suse.de
1783
1784
- fixed: rckrb5kdc restart gives wrong status with non-running service
1785
[#72446]
1786
1787
-------------------------------------------------------------------
1788
Thu Mar 10 10:48:07 CET 2005 - mc@suse.de
1789
1790
- add requires: e2fsprogs-devel to krb5-devel package [#71732]
1791
1792
-------------------------------------------------------------------
1793
Fri Feb 25 17:35:37 CET 2005 - mc@suse.de
1794
1795
- fix double free [#66534]
1796
krb5-1.4-fix-error_tables.dif
1797
1798
-------------------------------------------------------------------
1799
Fri Feb 11 14:01:32 CET 2005 - mc@suse.de
1800
1801
- change mode for shared libraries to 755
1802
1803
-------------------------------------------------------------------
1804
Fri Feb 4 16:48:16 CET 2005 - mc@suse.de
1805
1806
- remove spx.c from tarball because of legal risk
1807
- add README.Source which tell the user about this
1808
action.
1809
- add a check for spx.c in the spec-file
1810
- use rich-text for update-messages [#50250]
1811
1812
-------------------------------------------------------------------
1813
Tue Feb 1 12:13:45 CET 2005 - mc@suse.de
1814
1815
- add krb5-1.4-reduce-namespace-polution.dif
1816
reduce namespace polution in gssapi.h [#50356]
1817
1818
-------------------------------------------------------------------
1819
Fri Jan 28 13:25:42 CET 2005 - mc@suse.de
1820
1821
- update to version 1.4
1822
- Add implementation of the RPCSEC_GSS authentication flavor to the
1823
RPC library.
1824
- Thread safety for krb5 libraries.
1825
- Merged Athena telnetd changes for creating a new option for
1826
requiring encryption.
1827
- The kadmind4 backwards-compatibility admin server and the v5passwdd
1828
backwards-compatibility password-changing server have been removed.
1829
- Yarrow code now uses AES.
1830
- Merged Athena changes to allow ftpd to require encrypted passwords.
1831
- Incorporate gss_krb5_set_allowable_enctypes() and
1832
gss_krb5_export_lucid_sec_context(), which are needed for NFSv4.
1833
- remove obsolet patches
1834
1835
-------------------------------------------------------------------
1836
Mon Jan 17 11:34:52 CET 2005 - mc@suse.de
1837
1838
- add proofreaded update-messages
1839
1840
-------------------------------------------------------------------
1841
Fri Jan 14 14:38:25 CET 2005 - mc@suse.de
1842
1843
- remove Conflicts: and add Provides:
1844
- add some insserv stuff
1845
1846
-------------------------------------------------------------------
1847
Thu Jan 13 11:54:01 CET 2005 - mc@suse.de
1848
1849
- move vendor files to vendor-files.tar.bz2
1850
- add obsoletes: heimdal
1851
- add %pre and %post sections to detect update
1852
from heimdal and backup invalid configuration files
1853
- add update-messages for heimdal update
1854
1855
-------------------------------------------------------------------
1856
Mon Jan 10 12:18:02 CET 2005 - mc@suse.de
1857
1858
- update to version 1.3.6
1859
- fix for: heap buffer overflow in libkadm5srv
1860
[CAN-2004-1189 / MITKRB5-SA-2004-004]
1861
1862
-------------------------------------------------------------------
1863
Tue Dec 14 15:30:23 CET 2004 - mc@suse.de
1864
1865
- build doc subpackage in an own specfile
1866
- removed unnecessary neededforbuild requirements
1867
1868
-------------------------------------------------------------------
1869
Wed Nov 24 13:37:53 CET 2004 - coolo@suse.de
1870
1871
- fix build with gcc 4
1872
1873
-------------------------------------------------------------------
1874
Mon Nov 15 17:25:56 CET 2004 - mc@suse.de
1875
1876
- added Conflicts with heimdal*
1877
- rename some manpages to avoid conflicts
1878
1879
-------------------------------------------------------------------
1880
Thu Nov 4 18:03:11 CET 2004 - mc@suse.de
1881
1882
- new init scripts
1883
- fix logrotate scripts
1884
- add some 64Bit fixes
1885
- add default krb5.conf, kdc.conf and kadm5.acl
1886
1887
-------------------------------------------------------------------
1888
Wed Nov 3 18:52:07 CET 2004 - mc@suse.de
1889
1890
- add e2fsprogs to NFB
1891
- use system-et and system-ss
1892
- fix includes of com_err.h
1893
1894
-------------------------------------------------------------------
1895
Thu Oct 28 17:58:41 CEST 2004 - mc@suse.de
1896
1897
- Initital checkin
1898
1899