krb5-1.13.7 is released
Tom Yu
tlyu at mit.edu
Fri Sep 16 18:34:46 EDT 2016
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.13.7. Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.13.7
====================================
You may retrieve the Kerberos 5 Release 1.13.7 source from the
following URL:
http://web.mit.edu/kerberos/dist/
More information about the krb5-1.13.7 release is at:
http://web.mit.edu/kerberos/krb5-1.13/
Further information about Kerberos 5 may be found at the following
URL:
http://web.mit.edu/kerberos/
and at the MIT Kerberos Consortium web site:
http://www.kerberos.org/
DES transition
==============
The Data Encryption Standard (DES) is widely recognized as weak. The
krb5-1.7 release contains measures to encourage sites to migrate away
- From using single-DES cryptosystems. Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.
Major changes in 1.13.7 (2016-09-15)
====================================
This is a bug fix release. The krb5-1.13 release series is near the
end of its maintenance period, and krb5-1.13.7 will probably be the
final release of this series. For new deployments, installers should
prefer the krb5-1.14 release series or later.
* Fix some rare btree data corruption bugs
* Fix numerous minor memory leaks
* Improve portability (Linux-ppc64el, FreeBSD)
* Improve some error messages
* Improve documentation
Major changes in 1.13.6 (2016-07-25)
====================================
This is a bug fix release. The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.
* Improve some error messages
* Improve documentation
* Allow a principal with nonexistent policy to bypass the minimum
password lifetime check, consistent with other aspects of
nonexistent policies
* Fix a rare KDC denial of service vulnerability when anonymous client
principals are restricted to obtaining TGTs only [CVE-2016-3120]
Major changes in 1.13.5 (2016-04-18)
====================================
This is a bug fix release. The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.
* Fix a moderate-severity vulnerability in the LDAP KDC back end that
could be exploited by a privileged kadmin user [CVE-2016-3119]
Major changes in 1.13.4 (2016-03-07)
====================================
This is a bug fix release. The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.
* Fix some moderate-severity vulnerabilities [CVE-2015-8629,
CVE-2015-8630, CVE-2015-8631] in kadmind.
* Improve behavior on hosts with long hostnames.
* Avoid spurious failures when doing normal kprop to heavily loaded
slave KDCs.
Major changes in 1.13.3 (2015-12-04)
====================================
This is a bug fix release. The krb5-1.13 release series is in
maintenance, and for new deployments, installers should prefer the
krb5-1.14 release series or later.
* Fix memory aliasing issues in SPNEGO and IAKERB mechanisms that
could cause server crashes. [CVE-2015-2695] [CVE-2015-2696]
[CVE-2015-2698]
* Fix build_principal memory bug that could cause a KDC
crash. [CVE-2015-2697]
* Allow an iprop slave to receive full resyncs from KDCs running
krb5-1.10 or earlier.
Major changes in 1.13.2 (2015-05-08)
====================================
This is a bug fix release.
* Fix a minor vulnerability in krb5_read_message, which is primarily
used in the BSD-derived kcmd suite of applications. [CVE-2014-5355]
* Fix a bypass of requires_preauth in KDCs that have PKINIT enabled.
[CVE-2015-2694]
* Fix some issues with the LDAP KDC database back end.
* Fix an iteration-related memory leak in the DB2 KDC database back
end.
* Fix issues with some less-used kadm5.acl functionality.
* Improve documentation.
Major changes in 1.13.1 (2015-02-11)
====================================
This is a bug fix release.
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354] [CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421
CVE-2014-9422 CVE-2014-9423]
Major changes in 1.13 (2014-10-15)
==================================
Administrator experience:
* Add support for accessing KDCs via an HTTPS proxy server using the
MS-KKDCP protocol.
* Add support for hierarchical incremental propagation, where slaves
can act as intermediates between an upstream master and other
downstream slaves.
* Add support for configuring GSS mechanisms using
/etc/gss/mech.d/*.conf files in addition to /etc/gss/mech.
* Add support to the LDAP KDB module for binding to the LDAP server
using SASL.
* The KDC listens for TCP connections by default.
* Fix a minor key disclosure vulnerability where using the "keepold"
option to the kadmin randkey operation could return the old keys.
[CVE-2014-5351]
User experience:
* Add client support for the Kerberos Cache Manager protocol. If the
host is running a Heimdal kcm daemon, caches served by the daemon
can be accessed with the KCM: cache type.
* When built on OS X 10.7 and higher, use "KCM:" as the default cache
type, unless overridden by command-line options or krb5-config
values.
Performance:
* Add support for doing unlocked database dumps for the DB2 KDC back
end, which would allow the KDC and kadmind to continue accessing the
database during lengthy database dumps.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=IK/e
-----END PGP SIGNATURE-----
More information about the kerberos-announce
mailing list