krb5-1.13.6 is released

Tom Yu tlyu at mit.edu
Tue Jul 26 19:10:50 EDT 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.13.6.  Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.

RETRIEVING KERBEROS 5 RELEASE 1.13.6
====================================

You may retrieve the Kerberos 5 Release 1.13.6 source from the
following URL:

        http://web.mit.edu/kerberos/dist/

More information about the krb5-1.13.6 release is at:

        http://web.mit.edu/kerberos/krb5-1.13/

Further information about Kerberos 5 may be found at the following
URL:

        http://web.mit.edu/kerberos/

and at the MIT Kerberos Consortium web site:

        http://www.kerberos.org/


DES transition
==============

The Data Encryption Standard (DES) is widely recognized as weak.  The
krb5-1.7 release contains measures to encourage sites to migrate away
- From using single-DES cryptosystems.  Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.


Major changes in 1.13.6 (2016-07-25)
====================================

This is a bug fix release.  The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.

* Improve some error messages

* Improve documentation

* Allow a principal with nonexistent policy to bypass the minimum
  password lifetime check, consistent with other aspects of
  nonexistent policies

* Fix a rare KDC denial of service vulnerability when anonymous client
  principals are restricted to obtaining TGTs only [CVE-2016-3120]

Major changes in 1.13.5 (2016-04-18)
====================================

This is a bug fix release.  The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.

* Fix a moderate-severity vulnerability in the LDAP KDC back end that
  could be exploited by a privileged kadmin user [CVE-2016-3119]

Major changes in 1.13.4 (2016-03-07)
====================================

This is a bug fix release.  The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.

* Fix some moderate-severity vulnerabilities [CVE-2015-8629,
  CVE-2015-8630, CVE-2015-8631] in kadmind.

* Improve behavior on hosts with long hostnames.

* Avoid spurious failures when doing normal kprop to heavily loaded
  slave KDCs.


Major changes in 1.13.3 (2015-12-04)
====================================

This is a bug fix release.  The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.

* Fix memory aliasing issues in SPNEGO and IAKERB mechanisms that
  could cause server crashes. [CVE-2015-2695] [CVE-2015-2696]
  [CVE-2015-2698]

* Fix build_principal memory bug that could cause a KDC
  crash. [CVE-2015-2697]

* Allow an iprop slave to receive full resyncs from KDCs running
  krb5-1.10 or earlier.


Major changes in 1.13.2 (2015-05-08)
====================================

This is a bug fix release.

* Fix a minor vulnerability in krb5_read_message, which is primarily
  used in the BSD-derived kcmd suite of applications.  [CVE-2014-5355]

* Fix a bypass of requires_preauth in KDCs that have PKINIT enabled.
  [CVE-2015-2694]

* Fix some issues with the LDAP KDC database back end.

* Fix an iteration-related memory leak in the DB2 KDC database back
  end.

* Fix issues with some less-used kadm5.acl functionality.

* Improve documentation.


Major changes in 1.13.1 (2015-02-11)
====================================

This is a bug fix release.

* Fix multiple vulnerabilities in the LDAP KDC back end.
  [CVE-2014-5354] [CVE-2014-5353]

* Fix multiple kadmind vulnerabilities, some of which are based in the
  gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421
  CVE-2014-9422 CVE-2014-9423]


Major changes in 1.13 (2014-10-15)
==================================

Administrator experience:

* Add support for accessing KDCs via an HTTPS proxy server using the
  MS-KKDCP protocol.

* Add support for hierarchical incremental propagation, where slaves
  can act as intermediates between an upstream master and other
  downstream slaves.

* Add support for configuring GSS mechanisms using
  /etc/gss/mech.d/*.conf files in addition to /etc/gss/mech.

* Add support to the LDAP KDB module for binding to the LDAP server
  using SASL.

* The KDC listens for TCP connections by default.

* Fix a minor key disclosure vulnerability where using the "keepold"
  option to the kadmin randkey operation could return the old keys.
  [CVE-2014-5351]

User experience:

* Add client support for the Kerberos Cache Manager protocol. If the
  host is running a Heimdal kcm daemon, caches served by the daemon
  can be accessed with the KCM: cache type.

* When built on OS X 10.7 and higher, use "KCM:" as the default cache
  type, unless overridden by command-line options or krb5-config
  values.

Performance:

* Add support for doing unlocked database dumps for the DB2 KDC back
  end, which would allow the KDC and kadmind to continue accessing the
  database during lengthy database dumps.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=CZI1
-----END PGP SIGNATURE-----



More information about the kerberos-announce mailing list