Opened 9 years ago
Closed 9 years ago
#6482 closed enhancement (fixed)
krb5-1.13.2 (MIT Kerberos V5-1.13.2)
Reported by: | Fernando de Oliveira | Owned by: | Fernando de Oliveira |
---|---|---|---|
Priority: | normal | Milestone: | 7.8 |
Component: | BOOK | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description
http://web.mit.edu/kerberos/www/dist/krb5/1.13/krb5-1.13.2-signed.tar
http://web.mit.edu/kerberos/krb5-1.13/krb5-1.13.2.html#announcement
or
http://web.mit.edu/kerberos/krb5-1.13/README-1.13.2.txt
Major changes in 1.13.2 (2015-05-08) ------------------------------------ This is a bug fix release. * Fix a minor vulnerability in krb5_read_message, which is primarily used in the BSD-derived kcmd suite of applications. [CVE-2014-5355] * Fix a bypass of requires_preauth in KDCs that have PKINIT enabled. [CVE-2015-2694] * Fix some issues with the LDAP KDC database back end. * Fix an iteration-related memory leak in the DB2 KDC database back end. * Fix issues with some less-used kadm5.acl functionality. * Improve documentation. krb5-1.13.2 changes by ticket ID -------------------------------- 8050 Fix krb5_read_message handling [CVE-2014-5355] 8149 Add formats section to documentation 8153 Import names immediately with COMPOSITE_EXPORT 8154 kadmind ACL back-references can affect later lines 8155 kadm5.acl flag restrictions don't use documented syntax 8160 requires_preauth bypass in PKINIT-enabled KDC [CVE-2015-2694] 8162 Disable principal renames for LDAP 8166 Fix LDAP ticket policies on big-endian LP64 8168 Fix memory leak in DB2 iteration 8170 Fix minor documentation errors
Change History (2)
comment:1 by , 9 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 9 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.
Fixed at r15956.