ELSA-2024-5076

ELSA-2024-5076 - krb5 security update

Type:SECURITY
Severity:MODERATE
Release Date:2024-09-30

Description


[1.15.1-55.0.3]
- Length check when parsing GSS token encapsulation [Orabug: 36927256]
- Add a simple DER support header [Orabug: 36927256]
- Fix vulnerabilities in GSS message token handling [Orabug: 36927256]

[1.15.1-55.0.1]
- Add recursion limit for ASN.1 indefinite lengths [Orabug: 32582360]

[1.15.1-55]
- Fix integer overflows in PAC parsing (CVE-2022-42898)
- Resolves: rhbz#2140961

[1.15.1-54]
- Try harder to avoid password change replay errors
- Resolves: #2063163

[1.15.1-53]
- Backport usage of SHA-256 instead of SHA-1 for PKINIT CMS digest
- Resolves: #2066319

[1.15.1-51]
- Fix KDC null deref on TGS inner body null server (CVE-2021-37750)
- Resolves: #1997599

[1.15.1-50]
- Disable smoke tests on s390x and remove sleep
- Resolves: #1782492

[1.15.1-49]
- Fix LDAP policy enforcement of pw_expiration
- Resolves: #1782492

[1.15.1-48]
- Fix LDAP policy enforcement of pw_expiration
- Resolves: #1782492

[1.15.1-47]
- Do expiration warnings for all init_creds APIs
- Resolves: #1733289

[1.15.1-46]
- Add pkinit_cert_match support
- Resolves: #1656126

[1.15.1-45]
- Install kerberos(7)
- Resolves: #1704726

[1.15.1-44]
- Address some optimized-out memset() calls
- Resolves: #1663506

[1.15.1-43]
- Correct kpasswd_server description in krb5.conf(5)
- Resolves: #1498347

[1.15.1-42]
- Log when non-root ksu authorization fails
- Resolves: #1270927

[1.15.1-41]
- Update man pages to reference kerberos(7)
- Resolves: #1704726

[1.15.1-40]
- Prefer TCP to UDP for password changes
- Resolves: #1637349

[1.15.1-39]
- Remove incorrect KDC assertion
- Resolves: #1673017

[1.15.1-38]
- Add FILE prefix to pkinit_anchors field
- Resolves: #1661338

[1.15.1-37]
- Bring back builtin crypto (openssl broke too many FIPS setups)
- Resolves: #1645711

[1.15.1-36]
- Clean up MEMORY ccache behavior to match upstream more closely
- Resolves: #1605756

[1.15.1-35]
- Fix bugs with concurrent use of MEMORY ccaches
- Resolves: #1605756

[1.15.1-34]
- In FIPS mode, add plaintext fallback for RC4 usages and taint
- Resolves: #1570600

[1.15.1-33]
- Use SHA-256 instead of MD5 for audit ticket IDs
- Resolves: #1570600

[1.15.1-32]
- Include preauth name in trace output if possible
- Update cert generation scripts to work on modern openssl
- Fix per-request preauth scoping
- Add test case for PKINIT DH renegotiation
- Echo KDC cookies in preauth tryagain
- Fall back to other preauth mechanisms after failures
- Resolves: #1540130

[1.15.1-31]
- Add German translation
- Resolves: #1497301

[1.15.1-30]
- Add default pkinit_anchors value to krb5.conf
- Resolves: #1508081

[1.15.1-29]
- Process profile includedir in sorted order
- Also, ignore dotfiles in included directories
- Resolves: #1539824

[1.15.1-28]
- Exit with status 0 from kadmind
- Resolves: #1373909

[1.15.1-27]
- Continue after KRB5_CC_END in KCM cache iteration
- Resolves: #1563166

[1.15.1-26]
- Merge duplicate subsections in profile library
- Resolves: #1519625

[1.15.1-25]
- Fix service dependencies on network state
- Resolves: #1525232

[1.15.1-24]
- Explicitly use openssl rather than builtin crypto
- Resolves: #1570600

[1.15.1-23]
- Fix flaws in LDAP DN checking (CVE-2018-5729, CVE-2018-5730)
- Resolves: #1562684
- Resolves: #1562679

[1.15.1-22]
- Fix segfault in finish_dispatch()
- Resolves: #1568970

[1.15.1-21]
- Unparse SANs with NO_REALM
- Resolves: #1482457

[1.15.1-20]
- Fix hex conversion of PKINIT certid strings
- Resolves: #1538491

[1.15.1-19]
- Limit ticket lifetime to 2^31-1 seconds
- Resolves: #1554723

[1.15.1-18]
- Expose context errors in pkinit_server_plugin_init
- Resolves: #1460089

[1.15.1-17]
- Drop certauth test changes that prevented runnig it
- Resolves: #1498767

[1.15.1-16]
- Drop irrelevant DIR trigger logic
- Resolves: #1431198

[1.15.1-15]
- Fix CVE-2017-7562 (certauth eku bypass)
- Resolves: #1498767

[1.15.1-14]
- Fix CVE-2017-11368 (s4u2 request assertion failures)
- Resolves: #1498768

[1.15.1-13]
- Force-add /etc/krb5.conf.d so we can guarantee it exists
- Resolves: #1431198

[1.15.1-12]
- Add krb5 policy plugin interface
- Remove soname downgrade
- Resolves: #1462982

[1.15.1-11]
- Make t_certauth.py runnable
- Resolves: #1443388

[1.15.1-10]
- Add context SSF query support
- Resolves: #1472956

[1.15.1-9]
- Remove incomplete PKINIT OCSP support
- Resolves: #1460089

[1.15.1-8]
- Add kprop.service argument file
- Resolves: #1389073

[1.15.1-7]
- Fix enterprise principal forwarding
- Resolves: #1378440

[1.15.1-6]
- Fix bug in certauth backport
- Resolves: #1428484

[1.15.1-5]
- rubygem-rkerberos still needs us to lie about soname
- Resolves: #1389073

[1.15.1-4]
- Backport certauth plugin and related pkinit changes
- Note: related changes cannot be tested because RHEL does not allow
binary git diffs
- Resolves: #1428484

[1.15.1-3]
- Remove duplication between subpackages
- Resolves: #1254640

[1.15.1-2]
- Add back deleted sources
- Resolves: #1389073

[1.15.1-1]
- Bump to krb5-1.15.1 (very small change)
- Apply some sanity to our patches and ordering
- Resolves: #1389073

[1.15-2]
- Reinstate e_data free method; bumps KDB to 6.1
- Resolves: #1389073

[1.15-1]
- Rebase to 1.15-final
- Resolves: #1389073
- Resolves: #1367169
- Resolves: #1389072
- Resolves: #1366863

[1.14.1-27]
- Properly handle EOF on libkrad sockets
- Resolves: #1382449

[1.14.1-26]
- Use responder in non-preauth AS reqs
- Resolves: #1363690

[1.14.1-25]
- Fix bad debug_log() call in selinux handling
- Resolves: #1292153

[1.14.1-24]
- Fix KKDCPP with TLS SNI by always presenting 'Host:' header
- Resolves: #1364993

[1.14.1-23]
- Add dependency on libkadm5 to krb5-devel
- Resolves: #1347403

[1.14.1-22]
- Builders have new version of mock; adapt.
- Resolves: #1290239

[1.14.1-21]
- Fix CVE-2016-3120
- Resolves: #1361504

[1.14.1-20]
- Make version dependencies on libkadm5 more explicit to appease rpmdiff
- Resolves: #1347403

[1.14.1-19]
- Add in upstream version of kprop port and tests
- Resolves: #1292795

[1.14.1-18]
- Fix incorrect recv() size calculation in libkrad
- Resolves: #1349042

[1.14.1-17]
- Separate out the kadm5 libs
- Resolves: #1347403

[1.14.1-16]
- Fix kprop/iprop handling of default realm
- Fix t_kprop.py
- Resolves: #1290561
- Resolves: #1302967
- Resolves: #1292795

[1.14.1-15]
- Fix SPNEGO with NTLM to conform to MS-SPNG section 3.3.5.1
- Resolves: #1341726

[1.14.1-14]
- Do not indicate depricated mechanisms when requested
- Resolves: #1293908

[1.14.1-13]
- Fix OTP module incorrectly overwriting as_key
- Resolves: #1340304

[1.14.1-12]
- Fix CVE-2016-3119 (LDAP NULL dereference)
- Resolves: #1339562

[1.14.1-11]
- Make ksu not ask for password without -n
- Resolves: #1247261

[1.14.1-10]
- Frob kadm5 soname version so that the rebase does not break things
- Resolves: #1292153

[1.14.1-9]
- Revamp selinux patch to not leak memory
- Resolves: #1313457

[1.14.1-8]
- Add snippet support in /etc/krb5.conf.d
- Resolves: #1146945

[1.14.1-7]
- Skip unnecessary mech calls in gss_inquire_cred
- Resolves: #1314493

[1.14.1-6]
- Fix impersonate_name to work with interposers
- Resolves: #1284987

[1.14.1-5]
- Fix change tracking of krb5.conf
- Resolves: #1208243

[1.14.1-4]
- Ensure log files are not world-readable
- Resolves: #1256735

[1.14.1-3]
- Clean up initscript handling in spec file
- Resolves: #1283902
- Resolves: #1183058

[1.14.1-2]
- Backport spec file changes from Fedora
- Resolves: #1290239

[1.14.1-1]
- Rebase to new upstream version 1.14.1
- Remove pax logic
- Resolves: #1292153
- Resolves: #1135427
- Resolves: #1265509
- Resolves: #1265510
- Resolves: #1296241

[1.13.2-12]
- Remove obsolete trigger to enable building of package
- Resolves: #1306970

[1.13.2-11]
- Fix CVE-2015-8631, CVE-2015-8630, and CVE-2015-8629
- Resolves: #1306970

[1.13.2-9]
- Add patch and test case for 'KDC does not return proper
client principal for client referrals'
- Resolves: #1259846

[1.13.2-9]
- Ammend patch for RedHat bug #1252454 ('testsuite complains
'Lifetime has increased by 32436 sec while 0 sec passed!',
while rhel5-libkrb5 passes') to handle the newly introduced
valgrind hits.

[1.13.2-8]
- Add a patch to fix RH Bug #1250154 ('[s390x, ppc64, ppc64le]:
kadmind does not accept ACL if kadm5.acl does not end with EOL')
The code 'accidently' works on x86/AMD64 because declaring a
variable |char| results in an |unsigned char| by default while
most other platforms (e.g. { s390x, ppc64, ppc64le, ...})
default to |signed char| (still have to use lint(1) to clean
up 38 more instances of this kind of bug).

[1.13.2-7]
- Obsolete multilib versions of server packages to fix RH
bug #1251913 ('krb5 should obsolete the multilib versions
of krb5-server and krb5-server-ldap').
The following packages are declared obsolete:
- krb5-server-1.11.3-49.el7.i686
- krb5-server-1.11.3-49.el7.ppc
- krb5-server-1.11.3-49.el7.s390
- krb5-server-ldap-1.11.3-49.el7.i686
- krb5-server-ldap-1.11.3-49.el7.ppc
- krb5-server-ldap-1.11.3-49.el7.s390

[1.13.2-6]
- Add a patch to fix RedHat bug #1252454 ('testsuite complains
'Lifetime has increased by 32436 sec while 0 sec passed!',
while rhel5-libkrb5 passes') so that krb5 resolves GSS creds
if |time_rec| is requested.

[1.13.2-5]
- Add a patch to fix RedHat bug #1251586 ('KDC sends multiple
requests to ipa-otpd for the same authentication') which causes
the KDC to send multiple retries to ipa-otpd for TCP transports
while it should only be done for UDP.

[1.13.2-4]
- the rebase to krb5 1.13.2 in vers 1.13.2-0 also fixed:
- Redhat Bug #1247761 ('RFE: Minor krb5 spec file cleanup and sync
with recent Fedora 22/23 changes')
- Redhat Bug #1247751 ('krb5-config returns wrong -specs path')
- Redhat Bug #1247608 ('Add support for multi-hop preauth mechs
via |KDC_ERR_MORE_PREAUTH_DATA_REQUIRED| for RFC 6113 ('A
Generalized Framework for Kerberos Pre-Authentication')')
- Removed 'krb5-1.10-kprop-mktemp.patch' and
'krb5-1.3.4-send-pr-tempfile.patch', both are no longer used since
the rebase to krb5 1.13.1

[1.13.2-3]
- Add patch to fix Redhat Bug #1222903 ('[SELinux] AVC denials may appear
when kadmind starts'). The issue was caused by an unneeded |htons()|
which triggered SELinux AVC denials due to the 'random' port usage.

[1.13.2-2]
- Add fix for RedHat Bug #1164304 ('Upstream unit tests loads
the installed shared libraries instead the ones from the build')

[1.13.2-1]
- the rebase to krb5 1.13.1 in vers 1.13.1-0 also fixed:
- Bug 1144498 ('Fix the race condition in the libkrb5 replay cache')
- Bug 1163402 ('kdb5_ldap_util view_policy does not shows ticket flags on s390x and ppc64')
- Bug 1185770 ('Missing upstream test in krb5-1.12.2: src/tests/gssapi/t_invalid.c')
- Bug 1204211 ('CVE-2014-5355 krb5: unauthenticated denial of service in recvauth_common() and other')

[1.13.2-0]
- Update to krb5-1.13.2
- drop patch for krb5-1.13.2-CVE_2015_2694_requires_preauth_bypass_in_PKINIT_enabled_KDC, fixed in krb5-1.13.2
- drop patch for krb5-1.12.1-CVE_2014_5355_fix_krb5_read_message_handling, fixed in krb5-1.13.2

[1.13.1-2]
- the rebase to krb5 1.13.1 in vers 1.13.1-0 also fixed RH
bug #1156144 ('krb5 upstream test t_kdb.py failure')

[1.13.1-1]
- fix for CVE-2015-2694 (#1218020) 'requires_preauth bypass
in PKINIT-enabled KDC'.
In MIT krb5 1.12 and later, when the KDC is configured with
PKINIT support, an unauthenticated remote attacker can
bypass the requires_preauth flag on a client principal and
obtain a ciphertext encrypted in the principal's long-term
key. This ciphertext could be used to conduct an off-line
dictionary attack against the user's password.

[1.13.1-0]
- Update to krb5-1.13.1
- patch krb5-1.12-selinux-label was updated and renamed to krb5-1.13-selinux-label
- patch krb5-1.11-dirsrv-accountlock was updated and renamed to krb5-1.13-dirsrv-accountlock
- drop patch for krb5-1.12-pwdch-fast, fixed in krb5-1.13
- drop patch for krb5-1.12ish-kpasswd_tcp, fixed in krb5-1.13
- drop patch for krb5-master-rcache-internal-const, no longer needed
- drop patch for krb5-master-rcache-acquirecred-cleanup, no longer needed
- drop patch for krb5-master-rcache-acquirecred-source, no longer needed
- drop patch for krb5-master-rcache-acquirecred-test, no longer needed
- drop patch for krb5-master-move-otp-sockets, no longer needed
- drop patch for krb5-master-mechd, no longer needed
- drop patch for krb5-master-strdupcheck, no longer needed
- drop patch for krb5-master-compatible-keys, no longer needed
- drop patch for krb5-1.12-system-exts, fixed in krb5-1.13
- drop patch for 0001-In-ksu-merge-krb5_ccache_copy-and-_restricted, no longer needed
- drop patch for 0002-In-ksu-don-t-stat-not-on-disk-ccache-residuals, no longer needed
- drop patch for 0003-Use-an-intermediate-memory-cache-in-ksu, no longer needed
- drop patch for 0004-Make-ksu-respect-the-default_ccache_name-setting, no longer needed
- drop patch for 0005-Copy-config-entries-to-the-ksu-target-ccache, no longer needed
- drop patch for 0006-Use-more-randomness-for-ksu-secondary-cache-names, no longer needed
- drop patch for 0007-Make-krb5_cc_new_unique-create-DIR-directories, no longer needed
- drop patch for krb5-1.12-kpasswd-skip-address-check, fixed in krb5-1.13
- drop patch for 0000-Refactor-cm-functions-in-sendto_kdc.c, no longer needed
- drop patch for 0001-Simplify-sendto_kdc.c, no longer needed
- drop patch for 0002-Add-helper-to-determine-if-a-KDC-is-the-master, no longer needed
- drop patch for 0003-Use-k5_transport-_strategy-enums-for-k5_sendto, no longer needed
- drop patch for 0004-Build-support-for-TLS-used-by-HTTPS-proxy-support, no longer needed
- drop patch for 0005-Add-ASN.1-codec-for-KKDCP-s-KDC-PROXY-MESSAGE, no longer needed
- drop patch for 0006-Dispatch-style-protocol-switching-for-transport, no longer needed
- drop patch for 0007-HTTPS-transport-Microsoft-KKDCPP-implementation, no longer needed
- drop patch for 0008-Load-custom-anchors-when-using-KKDCP, no longer needed
- drop patch for 0009-Check-names-in-the-server-s-cert-when-using-KKDCP, no longer needed
- drop patch for 0010-Add-some-longer-form-docs-for-HTTPS, no longer needed
- drop patch for 0011-Have-k5test.py-provide-runenv-to-python-tests, no longer needed
- drop patch for 0012-Add-a-simple-KDC-proxy-test-server, no longer needed
- drop patch for 0013-Add-tests-for-MS-KKDCP-client-support, no longer needed
- drop patch for krb5-1.12ish-tls-plugins, fixed in krb5-1.13.1
- drop patch for krb5-1.12-nodelete-plugins, fixed in krb5-1.13.1
- drop patch for krb5-1.12-ksu-untyped-default-ccache-name, fixed in krb5-1.13.1
- drop patch for krb5-1.12-ksu-no-ccache, fixed in krb5-1.13.1
- drop patch for krb5-ksu_not_working_with_default_principal, fixed in krb5-1.13.1
- drop patch for CVE_2014_5353_fix_LDAP_misused_policy_name_crash, fixed in krb5-1.13.1
- drop patch for CVE_2014_5354_support_keyless_principals_in_ldap, fixed in krb5-1.13.1
- drop patch for kinit -C loops (MIT/krb5 bug #243), fixed in krb5-1.13.1
- drop patch for CVEs { 2014-9421, 2014-9422, 2014-9423, 2014-5352 }, fixed in krb5-1.13.1
- added patch krb5-1.14-Support-KDC_ERR_MORE_PREAUTH_DATA_REQUIRED
- added patch krb5-1.12.1-CVE_2014_5355_fix_krb5_read_message_handling
- Minor spec cleanup

[1.12.2-14]
- fix for kinit -C loops (#1184629, MIT/krb5 issue 243, 'Do not
loop on principal unknown errors').

[1.12.2-13]
- fix for CVE-2014-5352 (#1179856) 'gss_process_context_token()
incorrectly frees context (MITKRB5-SA-2015-001)'
- fix for CVE-2014-9421 (#1179857) 'kadmind doubly frees partial
deserialization results (MITKRB5-SA-2015-001)'
- fix for CVE-2014-9422 (#1179861) 'kadmind incorrectly
validates server principal name (MITKRB5-SA-2015-001)'
- fix for CVE-2014-9423 (#1179863) 'libgssrpc server applications
leak uninitialized bytes (MITKRB5-SA-2015-001)'

[1.12.2-12]
- fix for CVE-2014-5354 (#1174546) 'krb5: NULL pointer
dereference when using keyless entries'

[1.12.2-11]
- fix for CVE-2014-5353 (#1174543) 'Fix LDAP misused policy
name crash'

[1.12.2-10]
- In ksu, without the -e flag, also check .k5users (#1105489)
When ksu was explicitly told to spawn a shell, a line in .k5users which
listed '*' as the allowed command would cause the principal named on the
line to be considered as a candidate for authentication.
When ksu was not passed a command to run, which implicitly meant that
the invoking user wanted to run the target user's login shell, knowledge
that the principal was a valid candidate was ignored, which could cause
a less optimal choice of the default target principal.
This doesn't impact the authorization checks which we perform later.
Patch by Nalin Dahyabhai

[1.12.2-9]
- Undo libkadmclnt SONAME change (from 8 to 9) which originally
happened in the krb5 1.12 rebase (#1166012) but broke
rubygem-rkerberos (sort of ruby language bindings for
libkadmclnt&co.) dependicies, as side effect of
rubygem-rkerberos using private interfaces in libkadmclnt.

[1.12.2-8]
- fix the problem where the %license file has been a dangling symlink
- ksu: pull in fix from pull #206 to avoid breakage when the
default_ccache_name doesn't include a cache type as a prefix
- ksu: pull in a proposed fix for pull #207 to avoid breakage when the
invoking user doesn't already have a ccache

[1.12.2-7]
- pull in patch from master to load plugins with RTLD_NODELETE, when
defined (RT#7947)

[1.12.2-6]
- backport patch to make the client skip checking the server's reply
address when processing responses to password-change requests, which
between NAT and upcoming HTTPS support, can cause us to erroneously
report an error to the user when the server actually reported success
(RT#7886)
- backport support for accessing KDCs and kpasswd services via HTTPS
proxies (marked by being specified as https URIs instead as hostnames
or hostname-and-port), such as the one implemented in python-kdcproxy
(RT#7929, #109919), and pick up a subsequent patch to build HTTPS
as a plugin

[1.12.2-5]
- backport fix for trying all compatible keys when not being strict about
acceptor names while reading AP-REQs (RT#7883, #1078888)
- define _GNU_SOURCE in files where we use EAI_NODATA, to make sure that
it's declared (#1059730,#1084068,#1109102)

[1.12.2-4]
- kpropd hasn't bothered with -S since 1.11; stop trying to use that flag
in the systemd unit file

[1.12.2-3]
- pull in upstream fix for an incorrect check on the value returned by a
strdup() call (#1132062)

[1.12.1-15]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild

[1.12.2-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild

[1.12.2-1]
- update to 1.12.2
- drop patch for RT#7820, fixed in 1.12.2
- drop patch for #231147, fixed as RT#3277 in 1.12.2
- drop patch for RT#7818, fixed in 1.12.2
- drop patch for RT#7836, fixed in 1.12.2
- drop patch for RT#7858, fixed in 1.12.2
- drop patch for RT#7924, fixed in 1.12.2
- drop patch for RT#7926, fixed in 1.12.2
- drop patches for CVE-2014-4341/CVE-2014-4342, included in 1.12.2
- drop patch for CVE-2014-4343, included in 1.12.2
- drop patch for CVE-2014-4344, included in 1.12.2
- drop patch for CVE-2014-4345, included in 1.12.2
- replace older proposed changes for ksu with backports of the changes
after review and merging upstream (#1015559, #1026099, #1118347)

[1.12.1-14]
- incorporate fix for MITKRB5-SA-2014-001 (CVE-2014-4345)

[1.12.1-13]
- gssapi: pull in upstream fix for a possible NULL dereference
in spnego (CVE-2014-4344)

[1.12.1-12]
- gssapi: pull in proposed fix for a double free in initiators (David
Woodhouse, CVE-2014-4343, #1117963)

[1.12.1-11]
- fix license handling

[1.12.1-10]
- pull in fix for denial of service by injection of malformed GSSAPI tokens
(CVE-2014-4341, CVE-2014-4342, #1116181)

[1.12.1-9]
- pull in changes from upstream which add processing of the contents of
/etc/gss/mech.d/*.conf when loading GSS modules (#1102839)

[1.12.1-8]
- pull in fix for building against tcl 8.6 (#1107061)

[1.12.1-7]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild

[1.12.1-6]
- Backport fix for change password requests when using FAST (RT#7868)

[1.12.1-5]
- spnego: pull in patch from master to restore preserving the OID of the
mechanism the initiator requested when we have multiple OIDs for the same
mechanism, so that we reply using the same mechanism OID and the initiator
doesn't get confused (#1066000, RT#7858)

[1.12.1-4]
- pull in patch from master to move the default directory which the KDC uses
when computing the socket path for a local OTP daemon from the database
directory (/var/kerberos/krb5kdc) to the newly-added run directory
(/run/krb5kdc), in line with what we're expecting in 1.13 (RT#7859, more
of #1040056 as #1063905)
- add a tmpfiles.d configuration file to have /run/krb5kdc created at
boot-time
- own /var/run/krb5kdc

[1.12.1-3]
- refresh nss_wrapper and add socket_wrapper to the %check environment

* Fri Jan 31 2014 Nalin Dahyabhai
- add currently-proposed changes to teach ksu about credential cache
collections and the default_ccache_name setting (#1015559,#1026099)

[1.12.1-2]
- pull in multiple changes to allow replay caches to be added to a GSS
credential store as 'rcache'-type credentials (RT#7818/#7819/#7836,

[1.12.1-1]
- update to 1.12.1
- drop patch for RT#7794, included now
- drop patch for RT#7797, included now
- drop patch for RT#7803, included now
- drop patch for RT#7805, included now
- drop patch for RT#7807, included now
- drop patch for RT#7045, included now
- drop patches for RT#7813 and RT#7815, included now
- add patch to always retrieve the KDC time offsets from keyring caches,
so that we don't mistakenly interpret creds as expired before their
time when our clock is ahead of the KDC's (RT#7820, #1030607)

[1.12-11]
- update the PIC patch for iaesx86.s to not use ELF relocations to the version
that landed upstream (RT#7815, #1045699)

* Thu Jan 09 2014 Nalin Dahyabhai
- pass -Wl,--warn-shared-textrel to the compiler when we're creating shared
libraries

[1.12-10]
- amend the PIC patch for iaesx86.s to also save/restore ebx in the
functions where we modify it, because the ELF spec says we need to

[1.12-9]
- grab a more-commented version of the most recent patch from upstream
master
- make a guess at making the 32-bit AES-NI implementation sufficiently
position-independent to not require execmod permissions for libk5crypto
(more of #1045699)

[1.12-8]
- add patch from Dhiru Kholia for the AES-NI implementations to allow
libk5crypto to be properly marked as not needing an executable stack
on arches where they're used (#1045699, and so many others)

[1.12-7]
- revert that last change for a bit while sorting out execstack when we
use AES-NI (#1045699)

[1.12-6]
- add yasm as a build requirement for AES-NI support, on arches that have
yasm and AES-NI

[1.12-5]
- pull in fix from master to make reporting of errors encountered by
the SPNEGO mechanism work better (RT#7045, part of #1043962)

* Thu Dec 19 2013 Nalin Dahyabhai
- update a test wrapper to properly handle things that the new libkrad does,
and add python-pyrad as a build requirement so that we can run its tests

[1.12-4]
- revise previous patch to initialize one more element

[1.12-3]
- backport fixes to krb5_copy_context (RT#7807, #1044735/#1044739)

[1.12-2]
- pull in fix from master to return a NULL pointer rather than allocating
zero bytes of memory if we read a zero-length input token (RT#7794, part of
- pull in fix from master to ignore an empty token from an acceptor if
we've already finished authenticating (RT#7797, part of #1043962)
- pull in fix from master to avoid a memory leak when a mechanism's
init_sec_context function fails (RT#7803, part of #1043962)
- pull in fix from master to avoid a memory leak in a couple of error
cases which could occur while obtaining acceptor credentials (RT#7805, part
of #1043962)

[1.12-1]
- update to 1.12 final

[1.12-beta2.0]
- update to beta2
- drop obsolete backports for storing KDC time offsets and expiration times
in keyring credential caches

[1.12-beta1.0]
- rebase to master
- update to beta1
- drop obsolete backport of fix for RT#7706

[1.11.4-2]
- pull in fix to store KDC time offsets in keyring credential caches (RT#7768,
- pull in fix to set expiration times on credentials stored in keyring
credential caches (RT#7769, #1031724)

[1.11.4-1]
- update to 1.11.4
- drop patch for RT#7650, obsoleted
- drop patch for RT#7706, obsoleted as RT#7723
- drop patch for CVE-2013-1418/CVE-2013-6800, included in 1.11.4

[1.11.3-31]
- switch to the simplified version of the patch for #1029110 (RT#7764)

[1.11.3-30]
- check more thoroughly for errors when resolving KEYRING ccache names of type
'persistent', which should only have a numeric UID as the next part of the
name (#1029110)

[1.11.3-29]
- incorporate upstream patch for remote crash of KDCs which serve multiple
realms simultaneously (RT#7756, CVE-2013-1418/CVE-2013-6800,

[1.11.3-28]
- drop patch to add additional access() checks to ksu - they add to breakage
when non-FILE: caches are in use (#1026099), shouldn't be resulting in any
benefit, and clash with proposed changes to fix its cache handling

[1.11.3-27]
- add some minimal description to the top of the wrapper scripts we use
when starting krb5kdc and kadmind to describe why they exist (tooling)

[1.12-alpha1.0]
- initial update to alpha1
- drop backport of persistent keyring support
- drop backport for RT#7689
- drop obsolete patch for fixing a use-before-init in a test program
- drop obsolete patch teaching config.guess/config.sub about aarch64-linux
- drop backport for RT#7598
- drop backport for RT#7172
- drop backport for RT#7642
- drop backport for RT#7643
- drop patches from master to not test GSSRPC-over-UDP and to not
depend on the portmapper, which are areas where our build systems
often give us trouble, too; obsolete
- drop backports for RT#7682
- drop backport for RT#7709
- drop backport for RT#7590 and partial backport for RT#7680
- drop OTP backport
- drop backports for RT#7656 and RT#7657
- BuildRequires: libedit-devel to prefer it
- BuildRequires: pkgconfig, since configure uses it

[1.11.3-26]
- create and own /etc/gss (#1019937)

[1.11.3-25]
- pull up fix for importing previously-exported credential caches in the
gssapi library (RT# 7706, #1019420)

[1.11.3-24]
- backport the callback to use the libkrb5 prompter when we can't load PEM
files for PKINIT (RT#7590, includes part of #965721/#1016690)
- extract the rest of the fix #965721/#1016690 from the changes for RT#7680

[1.11.3-23]
- fix trigger scriptlet's invocation of sed (#1016945)

[1.11.3-22]
- rebuild with keyutils 1.5.8 (part of #1012043)

[1.11.3-21]
- switch to the version of persistent-keyring that was just merged to
master (RT#7711), along with related changes to kinit (RT#7689)
- go back to setting default_ccache_name to a KEYRING type

[1.11.3-20]
- pull up fix for not calling a kdb plugin's check-transited-path
method before calling the library's default version, which only knows
how to read what's in the configuration file (RT#7709, #1013664)

[1.11.3-19]
- configure --without-krb5-config so that we don't pull in the old default
ccache name when we want to stop setting a default ccache name at configure-
time

[1.11.3-18]
- fix broken dependency on awk (should be gawk, rdieter)

[1.11.3-17]
- add missing dependency on newer keyutils-libs (#1012034)

[1.11.3-16]
- back out setting default_ccache_name to the new default for now, resetting
it to the old default while the kernel/keyutils bits get sorted (sgallagh)

[1.11.3-15]
- add explicit build-time dependency on a version of keyutils that's new
enough to include keyctl_get_persistent() (more of #991148)

[1.11.3-14]
- incorporate Simo's updated backport of his updated persistent-keyring changes
(more of #991148)

[1.11.3-13]
- don't break during %check when the session keyring is revoked

[1.11.3-12]
- pull the newer F21 defaults back to F20 (sgallagh)

* Mon Sep 09 2013 Nalin Dahyabhai
- only apply the patch to autocreate /run/user/0 when we're hard-wiring the
default ccache location to be under it; otherwise it's unnecessary

[1.11.3-11]
- don't let comments intended for one scriptlet become part of the 'script'
that gets passed to ldconfig as part of another one (Mattias Ellert, #1005675)

[1.11.3-10]
- incorporate Simo's backport of his persistent-keyring changes (#991148)
- restore build-time default DEFCCNAME on Fedora 21 and later and EL, and
instead set default_ccache_name in the default krb5.conf's [libdefaults]
section (#991148)
- on releases where we expect krb5.conf to be configured with a
default_ccache_name, add it whenever we upgrade from an older version of
the package that wouldn't have included it in its default configuration
file (#991148)

[1.11.3-9]
- take another stab at accounting for UnversionedDocdirs for the -libs
subpackage (spotted by ssorce)
- switch to just the snapshot of nss_wrapper we were using, since we
no longer need to carry anything that isn't in the cwrap.org repository
(ssorce)

[1.11.3-8]
- drop a patch we weren't not applying (build tooling)
- wrap kadmind and kpropd in scripts which check for the presence/absence
of files which dictate particular exit codes before exec'ing the actual
binaries, instead of trying to use ConditionPathExists in the unit files
to accomplish that, so that we exit with failure properly when what we
expect isn't actually in effect on the system (#800343)

[1.11.3-7]
- attempt to account for UnversionedDocdirs for the -libs subpackage

[1.11.3-6]
- tweak configuration files used during tests to try to reduce the number
of conflicts encountered when builds for multiple arches land on the same
builder

[1.11.3-5]
- pull up changes to allow GSSAPI modules to provide more functions
(RT#7682, #986564/#986565)

[1.11.3-4]
- use (a bundled, for now, copy of) nss_wrapper to let us run some of the
self-tests at build-time in more places than we could previously (#978756)
- cover inconsistencies in whether or not there's a local caching nameserver
that's willing to answer when the build environment doesn't have a
resolver configuration, so that nss_wrapper's faking of the local
hostname can be complete

[1.11.3-3]
- specify dependencies on the same arch of krb5-libs by using the %{?_isa}
suffix, to avoid dragging 32-bit libraries onto 64-bit systems (#980155)

[1.11.3-2]
- special-case /run/user/0, attempting to create it when resolving a
directory cache below it fails due to ENOENT and we find that it doesn't
already exist, either, before attempting to create the directory cache
(maybe helping, maybe just making things more confusing for #961235)

[1.11.3-1]
- update to 1.11.3
- drop patch for RT#7605, fixed in this release
- drop patch for CVE-2002-2443, fixed in this release
- drop patch for RT#7369, fixed in this release
- pull upstream fix for breaking t_skew.py by adding the patch for #961221

[1.11.2-10]
- respin with updated version of patch for RT#7650 (#969331)

[1.11.2-9]
- don't forget to set the SELinux label when creating the directory for
a DIR: ccache
- pull in proposed fix for attempts to get initial creds, which end up
following referrals, incorrectly trying to always use master KDCs if
they talked to a master at any point (should fix RT#7650)

[1.11.2-8]
- pull in patches from master to not test GSSRPC-over-UDP and to not
depend on the portmapper, which are areas where our build systems
often give us trouble, too

[1.11.2-7]
- backport fix for not being able to verify the list of transited realms
in GSS acceptors (RT#7639, #959685)
- backport fix for not being able to pass an empty password to the
get-init-creds APIs and have them actually use it (RT#7642, #960001)
- add backported proposed fix to use the unauthenticated server time
as the basis for computing the requested credential expiration times,
rather than the client's idea of the current time, which could be
significantly incorrect (#961221)

[1.11.2-6]
- pull in upstream fix to start treating a KRB5CCNAME value that begins
with DIR:: the same as it would a DIR: value with just one ccache file
in it (RT#7172, #965574)

[1.11.2-5]
- pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443,

[1.11.2-4]
- Update otp patches
- Merge otp patches into a single patch
- Add keycheck patch

[1.11.2-3]
- pull the changing of the compiled-in default ccache location to
DIR:/run/user/%{uid}/krb5cc back into F19, in line with SSSD and
the most recent pam_krb5 build

[1.11.2-2]
- correct some configuration file paths which the KDC_DIR patch missed

[1.11.2-1]
- update to 1.11.2
- drop pulled in patch for RT#7586, included in this release
- drop pulled in patch for RT#7592, included in this release
- pull in fix for keeping track of the message type when parsing FAST requests
in the KDC (RT#7605, #951843) (also #951965)

[1.11.1-9]
- move the compiled-in default ccache location from the previous default of
FILE:/tmp/krb5cc_%{uid} to DIR:/run/user/%{uid}/krb5cc (part of #949588)

[1.11.1-8]
- Update otp backport patches (libk5radius => libkrad)

[1.11.1-7]
- when testing the RPC library, treat denials from the local portmapper the
same as a portmapper-not-running situation, to allow other library tests
to be run while building the package

[1.11.1-6]
- create and own /var/kerberos/krb5/user instead of /var/kerberos/kdc/user,
since that's what the libraries actually look for
- add buildrequires on nss-myhostname, in an attempt to get more of the tests
to run properly during builds
- pull in Simo's patch to recognize 'client_keytab' as a key type which can
be passed in to gss_acquire_cred_from() (RT#7598)

[1.11.1-5]
- pull up Simo's patch to mark the correct mechanism on imported GSSAPI
contexts (RT#7592)
- go back to using reconf to run autoconf and autoheader (part of #925640)
- add temporary patch to use newer config.guess/config.sub (more of #925640)

* Mon Mar 18 2013 Nalin Dahyabhai
- fix a version comparison to expect newer texlive build requirements when
%{_rhel} > 6 rather than when it's > 7

[1.11.1-4]
- Add libverto-devel requires for krb5-devel
- Add otp support

[1.11.1-3]
- fix a memory leak when acquiring credentials using a keytab (RT#7586, #911110)

[1.11.1-2]
- prebuild PDF docs to reduce multilib differences (internal tooling, #884065)
- drop the kerberos-iv portreserve file, and drop the rest on systemd systems
- escape uses of macros in comments (more of #884065)

[1.11.1-1]
- update to 1.11.1
- drop patch for noticing negative timeouts being passed to the poll()
wrapper in the client transmit functions

[1.11-2]
- set 'rdns = false' in the default krb5.conf (#908323,#908324)

[1.11-1]
- update to 1.11 release

[1.11-0.beta2.0]
- update to 1.11 beta 2

* Thu Dec 13 2012 Nalin Dahyabhai
- when building with our bundled copy of libverto, package it in with -libs
rather than with -server (#886049)

[1.11-0.beta1.0]
- update to 1.11 beta 1

[1.11-0.alpha1.1]
- handle releases where texlive packaging wasn't yet as complicated as it
is in Fedora 18
- fix an uninitialized-variable error building one of the test programs

[1.11-0.alpha1.0]
- move the rather large pile of html and pdf docs to -workstation, so
that just having something that links to the libraries won't drag
them onto a system, and we avoid having to sort out hard-coded paths
that include %{_libdir} showing up in docs in multilib packages
- actually create %{_var}/kerberos/kdc/user, so that it can be packaged
- correct the list of packaged man pages
- don't dummy up required tex stylesheets, require them
- require pdflatex and makeindex

* Thu Nov 15 2012 Nalin Dahyabhai
- update to 1.11 alpha 1
- drop backported patch for RT #7406
- drop backported patch for RT #7407
- drop backported patch for RT #7408
- the new docs system generates PDFs, so stop including them as sources
- drop backported patch to allow deltat.y to build with the usual
warning flags and the current gcc
- drop backported fix for disabling use of a replay cache when verifying
initial credentials
- drop backported fix for teaching PKINIT clients which trust the KDC's
certificate directly to verify signed-data messages that are signed with
the KDC's certificate, when the blobs don't include a copy of the KDC's
certificate
- drop backported patches to make keytab-based authentication attempts
work better when the client tells the KDC that it supports a particular
cipher, but doesn't have a key for it in the keytab
- drop backported fix for avoiding spurious clock skew when a TGT is
decrypted long after the KDC sent it to the client which decrypts it
- move the cross-referenced HTML docs into the -libs package to avoid
broken internal links
- drop patches to fixup paths in man pages, shouldn't be needed any more

[1.10.3-7]
- tag a couple of other patches which we still need to be applied during
%{?_rawbuild} builds (zmraz)

[1.10.3-6]
- actually pull up the patch for RT#7063, and not some other ticket (#773496)

[1.10.3-5]
- add patch based on one from Filip Krska to not call poll() with a negative
timeout when the caller's intent is for us to just stop calling it (#838548)

* Fri Sep 07 2012 Nalin Dahyabhai
- on EL6, conflict with libsmbclient before 3.5.10-124, which is when it
stopped linking with a symbol which we no longer export (#771687)
- pull up patch for RT#7063, in which not noticing a prompt for a long
time throws the client library's idea of the time difference between it
and the KDC really far out of whack (#773496)
- add a backport of more patches to set the client's list of supported enctypes
when using a keytab to be the list of types of keys in the keytab, plus the
list of other types the client supports but for which it doesn't have keys,
in that order, so that KDCs have a better chance of being able to issue
tickets with session keys of types that the client can use (#837855)

[1.10.3-4]
- cut down the number of times we load SELinux labeling configuration from
a minimum of two times to actually one (more of #845125)

[1.10.3-3]
- backport patch to disable replay detection in krb5_verify_init_creds()
while reading the AP-REQ that's generated in the same function (RT#7229)

[1.10.3-2]
- undo rename from krb5-pkinit-openssl to krb5-pkinit on EL6
- version the Obsoletes: on the krb5-pkinit-openssl to krb5-pkinit rename
- reintroduce the init scripts for non-systemd releases
- forward-port %{?_rawbuild} annotations from EL6 packaging

[1.10.3-1]
- update to 1.10.3, rolling in the fixes from MITKRB5-SA-2012-001

[1.10.2-7]
- selinux: hang on to the list of selinux contexts, freeing and reloading
it only when the file we read it from is modified, freeing it when the
shared library is being unloaded (#845125)

[1.10.2-6]
- go back to not messing with library file paths on Fedora 17: it breaks
file path dependencies in other packages, and since Fedora 17 is already
released, breaking that is our fault

[1.10.2-5]
- add upstream patch to fix freeing an uninitialized pointer and dereferencing
another uninitialized pointer in the KDC (MITKRB5-SA-2012-001, CVE-2012-1014
and CVE-2012-1015, #844779 and #844777)
- fix a thinko in whether or not we mess around with devel .so symlinks on
systems without a separate /usr (sbose)

[1.10.2-4]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild

[1.10.2-3]
- backport a fix to allow a PKINIT client to handle SignedData from a KDC
that's signed with a certificate that isn't in the SignedData, but which
is available as an anchor or intermediate on the client (RT#7183)

[1.10.2-2]
- back out this labeling change (dwalsh):
- when building the new label for a file we're about to create, also mix
in the current range, in addition to the current user

[1.10.2-1]
- update to 1.10.2
- when building the new label for a file we're about to create, also mix
in the current range, in addition to the current user
- also package the PDF format admin, user, and install guides
- drop some PDFs that no longer get built right
- add a backport of Stef's patch to set the client's list of supported
enctypes to match the types of keys that we have when we are using a
keytab to try to get initial credentials, so that a KDC won't send us
an AS reply that we can't encrypt (RT#2131, #748528)
- don't shuffle around any shared libraries on releases with no-separate-/usr,
since /usr/lib is the same place as /lib
- add explicit buildrequires: on 'hostname', for the tests, on systems where
it's in its own package, and require net-tools, which used to provide the
command, everywhere

* Mon May 07 2012 Nalin Dahyabhai
- skip the setfscreatecon() if fopen() is passed 'rb' as the open mode (part
of #819115)

[1.10.1-3]
- have -server require /usr/share/dict/words, which we set as the default
dict_file in kdc.conf (#817089)

[1.10.1-2]
- change back dns_lookup_kdc to the default setting (Stef Walter, #805318)
- comment out example.com examples in default krb5.conf (Stef Walter, #805320)

[1.10.1-1]
- update to 1.10.1
- drop the KDC crash fix
- drop the KDC lookaside cache fix
- drop the fix for kadmind RPC ACLs (CVE-2012-1012)

[1.10-5]
- when removing -workstation, remove our files from the info index while
the file is still there, in %preun, rather than %postun, and use the
compressed file's name (#801035)

[1.10-4]
- Fix string RPC ACLs (RT#7093); CVE-2012-1012

[1.10-3]
- Add upstream lookaside cache behavior fix (RT#7082)

[1.10-2]
- add patch to accept keytab entries with vno==0 as matches when we're
searching for an entry with a specific name/kvno (#230382/#782211,RT#3349)

[1.10-1]
- update to 1.10 final

[1.10-0.beta1.2]
- Add upstream crashfix patch (RT#7081)

[1.10-0.beta1.1]
- update to beta 1

* Wed Jan 11 2012 Peter Robinson
- mktemp was long obsoleted by coreutils

[1.10-0.alpha2.2]
- modify the deltat grammar to also tell gcc (4.7) to suppress
'maybe-uninitialized' warnings in addition to the 'uninitialized' warnings
it's already being told to suppress (RT#7080)

[1.10-0.alpha2.1]
- update to alpha 2
- drop a couple of patches which were integrated for alpha 2

[1.10-0.alpha1.3]
- pull in patch for RT#7046: tag a ccache containing credentials obtained via
S4U2Proxy with the principal name of the proxying principal (part of #761317)
so that the default principal name can be set to that of the client for which
it is proxying, which results in the ccache looking more normal to consumers
of the ccache that don't care that there's proxying going on
- pull in patch for RT#7047: allow tickets obtained via S4U2Proxy to be cached
(more of #761317)
- pull in patch for RT#7048: allow PAC verification to only bother trying to
verify the signature with keys that it's given (still more of #761317)

[1.10-0.alpha1.2]
- apply upstream patch to fix a null pointer dereference when processing
TGS requests (CVE-2011-1530, #753748)

[1.10-0.alpha1.1]
- correct a bug in the fix for #754001 so that the file creation context is
consistently reset

[1.10-0.alpha1.0]
- update to 1.10 alpha 1
- on newer releases where we can assume NSS >= 3.13, configure PKINIT to build
using NSS
- on newer releases where we build PKINIT using NSS, configure libk5crypto to
build using NSS
- rename krb5-pkinit-openssl to krb5-pkinit on newer releases where we're
expecting to build PKINIT using NSS instead
- during %check, run check in the library and kdc subdirectories, which
should be able to run inside of the build system without issue

[1.9.1-19]
- Rebuilt for glibc bug#747377

[1.9.1-18]
- apply upstream patch to fix a null pointer dereference with the LDAP kdb
backend (CVE-2011-1527, #744125), an assertion failure with multiple kdb
backends (CVE-2011-1528), and a null pointer dereference with multiple kdb
backends (CVE-2011-1529) (#737711)

[1.9.1-17]
- pull in patch from trunk to rename krb5int_pac_sign() to krb5_pac_sign() and
make it public (#745533)

[1.9.1-16]
- kadmin.service: fix #723723 again
- kadmin.service,krb5kdc.service: remove optional use of in command
lines, because systemd parsing doesn't handle alternate value shell variable
syntax
- kprop.service: add missing Type=forking so that systemd doesn't assume simple
- kprop.service: expect the ACL configuration to be there, not absent
- handle a harder-to-trigger assertion failure that starts cropping up when we
exit the transmit loop on time (#739853)

[1.9.1-15]
- hardcode pid file as option in krb5kdc.service

[1.9.1-14]
- fix pid path in krb5kdc.service

[1.9.1-13]
- convert to systemd

[1.9.1-12]
- pull in upstream patch for RT#6952, confusion following referrals for
cross-realm auth (#734341)
- pull in build-time deps for the tests

[1.9.1-11]
- switch to the upstream patch for #727829

[1.9.1-10]
- handle an assertion failure that starts cropping up when the patch for
using poll (#701446) meets servers that aren't running KDCs or against
which the connection fails for other reasons (#727829, #734172)

[1.9.1-9]
- override the default build rules to not delete temporary y.tab.c files,
so that they can be packaged, allowing debuginfo files which point to them
do so usefully (#729044)

[1.9.1-8]
- build shared libraries with partial RELRO support (#723995)
- filter out potentially multiple instances of -Wl,-z,relro from krb5-config
output, now that it's in the buildroot's default LDFLAGS
- pull in a patch to fix losing track of the replay cache FD, from SVN by
way of Kevin Coffman

[1.9.1-7]
- kadmind.init: drop the attempt to detect no-database-present errors (#723723),
which is too fragile in cases where the database has been manually moved or
is accessed through another kdb plugin

[1.9.1-6]
- backport fixes to teach libkrb5 to use descriptors higher than FD_SETSIZE
to talk to a KDC by using poll() if it's detected at compile-time (#701446,
RT#6905)

[1.9.1-5]
- pull a fix from SVN to try to avoid triggering a PTR lookup in getaddrinfo()
during krb5_sname_to_principal(), and to let getaddrinfo() decide whether or
not to ask for an IPv6 address based on the set of configured interfaces
(#717378, RT#6922)
- pull a fix from SVN to use AI_ADDRCONFIG more often (RT#6923)

[1.9.1-4]
- apply upstream patch by way of Burt Holzman to fall back to a non-referral
method in cases where we might be derailed by a KDC that rejects the
canonicalize option (for example, those from the RHEL 2.1 or 3 era) (#715074)

[1.9.1-3]
- pull a fix from SVN to get libgssrpc clients (e.g. kadmin) authenticating
using the old protocol over IPv4 again (RT#6920)

* Tue Jun 14 2011 Nalin Dahyabhai
- incorporate a fix to teach the file labeling bits about when replay caches
are expunged (#576093)

* Thu May 26 2011 Nalin Dahyabhai
- switch to the upstream patch for #707145

[1.9.1-2]
- klist: don't trip over referral entries when invoked with -s (#707145,
RT#6915)

* Fri May 06 2011 Nalin Dahyabhai
- fixup URL in a comment
- when built with NSS, require 3.12.10 rather than 3.12.9

[1.9.1-1]
- update to 1.9.1:
- drop no-longer-needed patches for CVE-2010-4022, CVE-2011-0281,
CVE-2011-0282, CVE-2011-0283, CVE-2011-0284, CVE-2011-0285

[1.9-9]
- kadmind: add upstream patch to fix free() on an invalid pointer (#696343,
MITKRB5-SA-2011-004, CVE-2011-0285)

* Mon Apr 04 2011 Nalin Dahyabhai
- don't discard the error code from an error message received in response
to a change-password request (#658871, RT#6893)

* Fri Apr 01 2011 Nalin Dahyabhai
- override INSTALL_SETUID at build-time so that ksu is installed into
the buildroot with the right permissions (part of #225974)

[1.9-8]
- backport change from SVN to fix a computed-value-not-used warning in
kpropd (#684065)

[1.9-7]
- turn off NSS as the backend for libk5crypto for now to work around its
DES string2key not working (#679012)
- add revised upstream patch to fix double-free in KDC while returning
typed-data with errors (MITKRB5-SA-2011-003, CVE-2011-0284, #674325)

* Thu Feb 17 2011 Nalin Dahyabhai
- throw in a not-applied-by-default patch to try to make pkinit debugging
into a run-time boolean option named 'pkinit_debug'

[1.9-6]
- turn on NSS as the backend for libk5crypto, adding nss-devel as a build
dependency when that switch is flipped

[1.9-5]
- krb5kdc init script: prototype some changes to do a quick spot-check
of the TGS and kadmind keys and warn if there aren't any non-weak keys
on file for them (to flush out parts of #651466)

[1.9-4]
- add upstream patches to fix standalone kpropd exiting if the per-client
child process exits with an error (MITKRB5-SA-2011-001), a hang or crash
in the KDC when using the LDAP kdb backend, and an uninitialized pointer
use in the KDC (MITKRB5-SA-2011-002) (CVE-2010-4022, #664009,
CVE-2011-0281, #668719, CVE-2011-0282, #668726, CVE-2011-0283, #676126)

[1.9-3]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild

* Mon Feb 07 2011 Nalin Dahyabhai
- fix a compile error in the SELinux labeling patch when -DDEBUG is used (Sumit
Bose)

* Tue Feb 01 2011 Nalin Dahyabhai
- properly advertise that the kpropd init script now supports force-reload
(Zbysek Mraz, #630587)

[1.9-2]
- pkinit: when verifying signed data, use the CMS APIs for better
interoperability (#636985, RT#6851)

[1.9-1]
- update to 1.9 final

[1.9-0.beta3.1]
- fix link flags and permissions on shared libraries (ausil)

[1.9-0.beta3.0]
- update to 1.9 beta 3

[1.9-0.beta2.0]
- update to 1.9 beta 2

[1.9-0.beta1.1]
- drop not-needed-since-1.8 build dependency on rsh (ssorce)

[1.9-0.beta1.0]
- start moving to 1.9 with beta 1
- drop patches for RT#5755, RT#6762, RT#6774, RT#6775
- drop no-longer-needed backport patch for #539423
- drop no-longer-needed patch for CVE-2010-1322
- if WITH_NSS is set, built with --with-crypto-impl=nss (requires NSS 3.12.9)

[1.8.3-8]
- incorporate upstream patch to fix uninitialized pointer crash in the KDC's
authorization data handling (CVE-2010-1322, #636335)

[1.8.3-7]
- rebuild

[1.8.3-6]
- pull down patches from trunk to implement k5login_authoritative and
k5login_directory settings for krb5.conf (#539423)

* Wed Sep 29 2010 jkeating - 1.8.3-5
- Rebuilt for gcc bug 634757

[1.8.3-4]
- fix reading of keyUsage extensions when attempting to select pkinit client
certs (part of #629022, RT#6775)
- fix selection of pkinit client certs when one or more don't include a
subjectAltName extension (part of #629022, RT#6774)

[1.8.3-3]
- build with -fstack-protector-all instead of the default -fstack-protector,
so that we add checking to more functions (i.e., all of them) (#629950)
- also link binaries with -Wl,-z,relro,-z,now (part of #629950)

[1.8.3-2]
- fix a logic bug in computing key expiration times (RT#6762, #627022)

[1.8.3-1]
- update to 1.8.3
- drop backports of fixes for gss context expiration and error table
registration/deregistration mismatch
- drop patch for upstream #6750

[1.8.2-3]
- tell krb5kdc and kadmind to create pid files, since they can
- add logrotate configuration files for krb5kdc and kadmind (#462658)
- fix parsing of the pidfile option in the KDC (upstream #6750)

[1.8.2-2]
- libgssapi: pull in patch from svn to stop returning context-expired errors
when the ticket which was used to set up the context expires (#605366,
upstream #6739)

* Mon Jun 21 2010 Nalin Dahyabhai
- pull up fix for upstream #6745, in which the gssapi library would add the
wrong error table but subsequently attempt to unload the right one

[1.8.2-1]
- update to 1.8.2
- drop patches for CVE-2010-1320, CVE-2010-1321

[1.8.1-7]
- rebuild

* Thu May 27 2010 Nalin Dahyabhai
- ksu: move session management calls to before we drop privileges, like
su does (#596887), and don't skip the PAM account check for root or the
same user (more of #540769)

[1.8.1-6]
- make krb5-server-ldap also depend on the same version-release of krb5-libs,
as the other subpackages do, if only to make it clearer than it is when we
just do it through krb5-server
- drop explicit linking with libtinfo for applications that use libss, now
that readline itself links with libtinfo (as of readline-5.2-3, since
fedora 7 or so)
- go back to building without strict aliasing (compiler warnings in gssrpc)

[1.8.1-5]
- add patch to correct GSSAPI library null pointer dereference which could be
triggered by malformed client requests (CVE-2010-1321, #582466)

[1.8.1-4]
- fix output of kprop's init script's 'status' and 'reload' commands (#588222)

[1.8.1-3]
- incorporate patch to fix double-free in the KDC (CVE-2010-1320, #581922)

[1.8.1-2]
- fix a typo in kerberos.ldif

[1.8.1-1]
- update to 1.8.1
- no longer need patches for #555875, #561174, #563431, RT#6661, CVE-2010-0628
- replace buildrequires on tetex-latex with one on texlive-latex, which is
the package that provides it now

* Thu Apr 08 2010 Nalin Dahyabhai
- kdc.conf: no more need to suggest a v4 mode, or listening on the v4 port

* Thu Apr 08 2010 Nalin Dahyabhai
- drop patch to suppress key expiration warnings sent from the KDC in
the last-req field, as the KDC is expected to just be configured to either
send them or not as a particular key approaches expiration (#556495)

[1.8-5]
- add upstream fix for denial-of-service in SPNEGO (CVE-2010-0628, #576325)
- kdc.conf: no more need to suggest keeping keys with v4-compatible salting

[1.8-4]
- remove the krb5-appl bits (the -workstation-clients and -workstation-servers
subpackages) now that krb5-appl is its own package
- replace our patch for #563431 (kpasswd doesn't fall back to guessing your
principal name using your user name if you don't have a ccache) with the
one upstream uses

[1.8-3]
- add documentation for the ticket_lifetime option (#561174)

[1.8-2]
- pull up patch to get the client libraries to correctly perform password
changes over IPv6 (Sumit Bose, RT#6661)

[1.8-1]
- update to 1.8
- temporarily bundling the krb5-appl package (split upstream as of 1.8)
until its package review is complete
- profile.d scriptlets are now only needed by -workstation-clients
- adjust paths in init scripts
- drop upstreamed fix for KDC denial of service (CVE-2010-0283)
- drop patch to check the user's password correctly using crypt(), which
isn't a code path we hit when we're using PAM

[1.7.1-6]
- fix a null pointer dereference and crash introduced in our PAM patch that
would happen if ftpd was given the name of a user who wasn't known to the
local system, limited to being triggerable by gssapi-authenticated clients by
the default xinetd config (Olivier Fourdan, #569472)

[1.7.1-5]
- fix a regression (not labeling a kdb database lock file correctly, #569902)

[1.7.1-4]
- move the package changelog to the end to match the usual style (jdennis)
- scrub out references to (jdennis)
- include a symlink to the readme with the name LICENSE so that people can
find it more easily (jdennis)

[1.7.1-3]
- pull up the change to make kpasswd's behavior better match the docs
when there's no ccache (#563431)

[1.7.1-2]
- apply patch from upstream to fix KDC denial of service (CVE-2010-0283,

[1.7.1-1]
- update to 1.7.1
- don't trip AD lockout on wrong password (#542687, #554351)
- incorporates fixes for CVE-2009-4212 and CVE-2009-3295
- fixes gss_krb5_copy_ccache() when SPNEGO is used
- move sim_client/sim_server, gss-client/gss-server, uuclient/uuserver to
the devel subpackage, better lining up with the expected krb5/krb5-appl
split in 1.8
- drop kvno,kadmin,k5srvutil,ktutil from -workstation-servers, as it already
depends on -workstation which also includes them

[1.7-23]
- tighten up default permissions on kdc.conf and kadm5.acl (#558343)

[1.7-22]
- use portreserve correctly -- portrelease takes the basename of the file
whose entries should be released, so we need three files, not one

[1.7-21]
- suppress warnings of impending password expiration if expiration is more than
seven days away when the KDC reports it via the last-req field, just as we
already do when it reports expiration via the key-expiration field (#556495)
- link with libtinfo rather than libncurses, when we can, in future RHEL

[1.7-20]
- krb5_get_init_creds_password: check opte->flags instead of options->flags
when checking whether or not we get to use the prompter callback (#555875)

[1.7-19]
- use portreserve to make sure the KDC can always bind to the kerberos-iv
port, kpropd can always bind to the krb5_prop port, and that kadmind can
always bind to the kerberos-adm port (#555279)
- correct inadvertent use of macros in the changelog (rpmlint)

[1.7-18]
- add upstream patch for integer underflow during AES and RC4 decryption
(CVE-2009-4212), via Tom Yu (#545015)

[1.7-17]
- put the conditional back for the -devel subpackage
- back down to the earlier version of the patch for #551764; the backported
alternate version was incomplete

[1.7-16]
- use %global instead of %define
- pull up proposed patch for creating previously-not-there lock files for
kdb databases when 'kdb5_util' is called to 'load' (#551764)

* Mon Jan 04 2010 Dennis Gregorovic
- fix conditional for future RHEL

[1.7-15]
- add upstream patch for KDC crash during referral processing (CVE-2009-3295),
via Tom Yu (#545002)

[1.7-14]
- refresh patch for #542868 from trunk

* Thu Dec 10 2009 Nalin Dahyabhai
- move man pages that live in the -libs subpackage into the regular
%{_mandir} tree where they'll still be found if that package is the
only one installed (#529319)

[1.7-13]
- and put it back in

* Tue Dec 08 2009 Nalin Dahyabhai
- back that last change out

[1.7-12]
- try to make gss_krb5_copy_ccache() work correctly for spnego (#542868)

* Fri Dec 04 2009 Nalin Dahyabhai
- make krb5-config suppress CFLAGS output when called with --libs (#544391)

[1.7-11]
- ksu: move account management checks to before we drop privileges, like
su does (#540769)
- selinux: set the user part of file creation contexts to match the current
context instead of what we looked up
- configure with --enable-dns-for-realm instead of --enable-dns, which isn't
recognized any more

[1.7-10]
- move /etc/pam.d/ksu from krb5-workstation-servers to krb5-workstation,
where it's actually needed (#538703)

[1.7-9]
- add some conditional logic to simplify building on older Fedora releases

* Tue Oct 13 2009 Nalin Dahyabhai
- don't forget the README

[1.7-8]
- specify the location of the subsystem lock when using the status() function
in the kadmind and kpropd init scripts, so that we get the right error when
we're dead but have a lock file - requires initscripts 8.99 (#521772)

* Tue Sep 08 2009 Nalin Dahyabhai
- if the init script fails to start krb5kdc/kadmind/kpropd because it's already
running (according to status()), return 0 (part of #521772)

[1.7-7]
- work around a compile problem with new openssl

[1.7-6]
- rebuilt with new openssl

[1.7-5]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild

[1.7-5]
- rebuild to pick up the current forms of various patches

* Mon Jul 06 2009 Nalin Dahyabhai
- simplify the man pages patch by only preprocessing the files we care about
and moving shared configure.in logic into a shared function
- catch the case of ftpd printing file sizes using %i, when they might be
bigger than an int now

[1.7-4]
- try to merge and clean up all the large file support for ftp and rcp
- ftpd no longer prints a negative length when sending a large file
from a 32-bit host

* Tue Jun 30 2009 Nalin Dahyabhai
- pam_rhosts_auth.so's been gone, use pam_rhosts.so instead

[1.7-3]
- switch buildrequires: and requires: on e2fsprogs-devel into
buildrequires: and requires: on libss-devel, libcom_err-devel, per
sandeen on fedora-devel-list

* Fri Jun 26 2009 Nalin Dahyabhai
- fix a type mismatch in krb5_copy_error_message()
- ftp: fix some odd use of strlen()
- selinux labeling: use selabel_open() family of functions rather than
matchpathcon(), bail on it if attempting to get the mutex lock fails

* Tue Jun 16 2009 Nalin Dahyabhai
- compile with %{?_smp_mflags} (Steve Grubb)
- drop the bit where we munge part of the error table header, as it's not
needed any more

[1.7-2]
- add and own %{_libdir}/krb5/plugins/authdata

[1.7-1]
- update to 1.7
- no need to work around build issues with ASN1BUF_OMIT_INLINE_FUNCS
- configure recognizes --enable/--disable-pkinit now
- configure can take --disable-rpath now
- no more libdes425, krb524d, krb425.info
- kadmin/k5srvutil/ktutil are user commands now
- new kproplog
- FAST encrypted-challenge plugin is new
- drop static build logic
- drop pam_krb5-specific configuration from the default krb5.conf
- drop only-use-v5 flags being passed to various things started by xinetd
- put %{krb5prefix}/sbin in everyone's path, too (#504525)

[1.6.3-106]
- add an auth stack to ksu's PAM configuration so that pam_setcred() calls
won't just fail

[1.6.3-105]
- make PAM support for ksu also set PAM_RUSER

[1.6.3-104]
- extend PAM support to ksu: perform account and session management for the
target user
- pull up and merge James Leddy's changes to also set PAM_RHOST in PAM-aware
network-facing services

[1.6.3-103]
- fix a typo in a ksu error message (Marek Mahut)
- 'rev' works the way the test suite expects now, so don't disable tests
that use it

[1.6.3-102]
- add LSB-style init script info

* Fri Apr 17 2009 Nalin Dahyabhai
- explicitly run the pdf generation script using sh (part of #225974)

[1.6.3-101]
- add patches for read overflow and null pointer dereference in the
implementation of the SPNEGO mechanism (CVE-2009-0844, CVE-2009-0845)
- add patch for attempt to free uninitialized pointer in libkrb5
(CVE-2009-0846)
- add patch to fix length validation bug in libkrb5 (CVE-2009-0847)
- put the krb5-user .info file into just -workstation and not also
-workstation-clients

[1.6.3-100]
- turn off krb4 support (it won't be part of the 1.7 release, but do it now)
- use triggeruns to properly shut down and disable krb524d when -server and
-workstation-servers gets upgraded, because it's gone now
- move the libraries to /%{_lib}, but leave --libdir alone so that plugins
get installed and are searched for in the same locations (#473333)
- clean up buildprereq/prereqs, explicit mktemp requires, and add the
ldconfig for the -server-ldap subpackage (part of #225974)
- escape possible macros in the changelog (part of #225974)
- fixup summary texts (part of #225974)
- take the execute bit off of the protocol docs (part of #225974)
- unflag init scripts as configuration files (part of #225974)
- make the kpropd init script treat 'reload' as 'restart' (part of #225974)

[1.6.3-19]
- libgssapi_krb5: backport fix for some errors which can occur when
we fail to set up the server half of a context (CVE-2009-0845)

[1.6.3-18]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild

[1.6.3-17]
- rebuild

* Thu Sep 04 2008 Nalin Dahyabhai
- if we successfully change the user's password during an attempt to get
initial credentials, but then fail to get initial creds from a non-master
using the new password, retry against the master (#432334)

[1.6.3-16]
- fix license tag

* Wed Jul 16 2008 Nalin Dahyabhai
- clear fuzz out of patches, dropping a man page patch which is no longer
necessary
- quote %{__cc} where needed because it includes whitespace now
- define ASN1BUF_OMIT_INLINE_FUNCS at compile-time (for now) to keep building

[1.6.3-15]
- build with -fno-strict-aliasing, which is needed because the library
triggers these warnings
- don't forget to label principal database lock files
- fix the labeling patch so that it doesn't break bootstrapping

[1.6.3-14]
- generate src/include/krb5/krb5.h before building
- fix conditional for sparcv9

[1.6.3-13]
- ftp: use the correct local filename during mget when the 'case' option is
enabled (#442713)

[1.6.3-12]
- stop exporting kadmin keys to a keytab file when kadmind starts -- the
daemon's been able to use the database directly for a long long time now
- belatedly add aes128,aes256 to the default set of supported key types

[1.6.3-11]
- libgssapi_krb5: properly export the acceptor subkey when creating a lucid
context (Kevin Coffman, via the nfs4 mailing list)

[1.6.3-10]
- add fixes from MITKRB5-SA-2008-001 for use of null or dangling pointer
when v4 compatibility is enabled on the KDC (CVE-2008-0062, CVE-2008-0063,
- add fixes from MITKRB5-SA-2008-002 for array out-of-bounds accesses when
high-numbered descriptors are used (CVE-2008-0947, #433596)
- add backport bug fix for an attempt to free non-heap memory in
libgssapi_krb5 (CVE-2007-5901, #415321)
- add backport bug fix for a double-free in out-of-memory situations in
libgssapi_krb5 (CVE-2007-5971, #415351)

[1.6.3-9]
- rework file labeling patch to not depend on fragile preprocessor trickery,
in another attempt at fixing #428355 and friends

[1.6.3-8]
- ftp: add patch to fix 'runique on' case when globbing fixes applied
- stop adding a redundant but harmless call to initialize the gssapi internals

* Mon Feb 25 2008 Nalin Dahyabhai
- add patch to suppress double-processing of /etc/krb5.conf when we build
with --sysconfdir=/etc, thereby suppressing double-logging (#231147)

* Mon Feb 25 2008 Nalin Dahyabhai
- remove a patch, to fix problems with interfaces which are 'up' but which
have no address assigned, which conflicted with a different fix for the same
problem in 1.5 (#200979)

* Mon Feb 25 2008 Nalin Dahyabhai
- ftp: don't lose track of a descriptor on passive get when the server fails to
open a file

* Mon Feb 25 2008 Nalin Dahyabhai
- in login, allow PAM to interact with the user when they've been strongly
authenticated
- in login, signal PAM when we're changing an expired password that it's an
expired password, so that when cracklib flags a password as being weak it's
treated as an error even if we're running as root

[1.6.3-7]
- drop netdb patch
- kdb_ldap: add patch to treat 'nsAccountLock: true' as an indication that
the DISALLOW_ALL_TIX flag is set on an entry, for better interop with Fedora,
Netscape, Red Hat Directory Server (Simo Sorce)

[1.6.3-6]
- patch to avoid depending on to define NI_MAXHOST and NI_MAXSERV

[1.6.3-5]
- enable patch for key-expiration reporting
- enable patch to make kpasswd fall back to TCP if UDP fails (#251206)
- enable patch to make kpasswd use the right sequence number on retransmit
- enable patch to allow mech-specific creds delegated under spnego to be found
when searching for creds

[1.6.3-4]
- some init script cleanups
- drop unquoted check and silent exit for '' (#426852, #242502)
- krb524: don't barf on missing database if it looks like we're using kldap,
same as for kadmin
- return non-zero status for missing files which cause startup to
fail (#242502)

[1.6.3-3]
- allocate space for the nul-terminator in the local pathname when looking up
a file context, and properly free a previous context (Jose Plans, #426085)

[1.6.3-2]
- rebuild

[1.6.3-1]
- update to 1.6.3, dropping now-integrated patches for CVE-2007-3999
and CVE-2007-4000 (the new pkinit module is built conditionally and goes
into the -pkinit-openssl package, at least for now, to make a buildreq
loop with openssl avoidable)

[1.6.2-10]
- make proper use of pam_loginuid and pam_selinux in rshd and ftpd

* Fri Oct 12 2007 Nalin Dahyabhai
- make krb5.conf %verify(not md5 size mtime) in addition to
%config(noreplace), like /etc/nsswitch.conf (#329811)

[1.6.2-9]
- apply the fix for CVE-2007-4000 instead of the experimental patch for
setting ok-as-delegate flags

[1.6.2-8]
- move the db2 kdb plugin from -server to -libs, because a multilib libkdb
might need it

[1.6.2-7]
- also perform PAM session and credential management when ftpd accepts a
client using strong authentication, missed earlier
- also label kadmind log files and files created by the db2 plugin

[1.6.2-6]
- incorporate updated fix for CVE-2007-3999 (CVE-2007-4743)
- fix incorrect call to 'test' in the kadmin init script (#252322,#287291)

[1.6.2-5]
- incorporate fixes for MITKRB5-SA-2007-006 (CVE-2007-3999, CVE-2007-4000)

[1.6.2-4]
- cover more cases in labeling files on creation
- add missing gawk build dependency

[1.6.2-3]
- rebuild

[1.6.2-2]
- kdc.conf: default to listening for TCP clients, too (#248415)

[1.6.2-1]
- update to 1.6.2
- add 'buildrequires: texinfo-tex' to get texi2pdf

[1.6.1-8]
- incorporate fixes for MITKRB5-SA-2007-004 (CVE-2007-2442,CVE-2007-2443)
and MITKRB5-SA-2007-005 (CVE-2007-2798)

[1.6.1-7]
- reintroduce missing %postun for the non-split_workstation case

[1.6.1-6]
- rebuild

[1.6.1-5.1]
- rebuild

[1.6.1-5]
- add missing pam-devel build requirement, force selinux-or-fail build

[1.6.1-4]
- rebuild

[1.6.1-3]
- label all files at creation-time according to the SELinux policy (#228157)

* Fri Jun 22 2007 Nalin Dahyabhai
- perform PAM account / session management in krshd (#182195,#195922)
- perform PAM authentication and account / session management in ftpd
- perform PAM authentication, account / session management, and password-
changing in login.krb5 (#182195,#195922)

* Fri Jun 22 2007 Nalin Dahyabhai
- preprocess kerberos.ldif into a format FDS will like better, and include
that as a doc file as well

* Fri Jun 22 2007 Nalin Dahyabhai
- switch man pages to being generated with the right paths in them
- drop old, incomplete SELinux patch
- add patch from Greg Hudson to make srvtab routines report missing-file errors
at same point that keytab routines do (#241805)

[1.6.1-2]
- pull patch from svn to undo unintentional chattiness in ftp
- pull patch from svn to handle NULL krb5_get_init_creds_opt structures
better in a couple of places where they're expected

[1.6.1-1]
- update to 1.6.1
- drop no-longer-needed patches for CVE-2007-0956,CVE-2007-0957,CVE-2007-1216
- drop patch for sendto bug in 1.6, fixed in 1.6.1

* Fri May 18 2007 Nalin Dahyabhai
- kadmind.init: don't fail outright if the default principal database
isn't there if it looks like we might be using the kldap plugin
- kadmind.init: attempt to extract the key for the host-specific kadmin
service when we try to create the keytab

[1.6-6]
- omit dependent libraries from the krb5-config --libs output, as using
shared libraries (no more static libraries) makes them unnecessary and
they're not part of the libkrb5 interface (patch by Rex Dieter, #240220)
(strips out libkeyutils, libresolv, libdl)

[1.6-5]
- pull in keyutils as a build requirement to get the 'KEYRING:' ccache type,
because we've merged

[1.6-4]
- fix an uninitialized length value which could cause a crash when parsing
key data coming from a directory server
- correct a typo in the krb5.conf man page ('ldap_server'->'ldap_servers')

* Fri Apr 13 2007 Nalin Dahyabhai
- move the default acl_file, dict_file, and admin_keytab settings to
the part of the default/example kdc.conf where they'll actually have
an effect (#236417)

[1.5-24]
- merge security fixes from RHSA-2007:0095

[1.6-3]
- add patch to correct unauthorized access via krb5-aware telnet
daemon (#229782, CVE-2007-0956)
- add patch to fix buffer overflow in krb5kdc and kadmind
(#231528, CVE-2007-0957)
- add patch to fix double-free in kadmind (#231537, CVE-2007-1216)

* Thu Mar 22 2007 Nalin Dahyabhai
- back out buildrequires: keyutils-libs-devel for now

[1.6-2]
- add buildrequires: on keyutils-libs-devel to enable use of keyring ccaches,
dragging keyutils-libs in as a dependency

[1.5-23]
- fix bug ID in changelog

[1.5-22]
[1.5-21]
- add preliminary patch to fix buffer overflow in krb5kdc and kadmind
(#231528, CVE-2007-0957)
- add preliminary patch to fix double-free in kadmind (#231537, CVE-2007-1216)

* Wed Feb 28 2007 Nalin Dahyabhai
- add patch to build semi-useful static libraries, but don't apply it unless
we need them

[1.5-20]
- temporarily back out %post changes, fix for #143289 for security update
- add preliminary patch to correct unauthorized access via krb5-aware telnet

* Mon Feb 19 2007 Nalin Dahyabhai
- make profile.d scriptlets mode 644 instead of 755 (part of #225974)

[1.6-1]
- clean up quoting of command-line arguments passed to the krsh/krlogin
wrapper scripts

* Mon Jan 22 2007 Nalin Dahyabhai
- initial update to 1.6, pre-package-reorg
- move workstation daemons to a new subpackage (#81836, #216356, #217301), and
make the new subpackage require xinetd (#211885)

[1.5-18]
- make use of install-info more failsafe (Ville Skytta, #223704)
- preserve timestamps on shell scriptlets at %install-time

[1.5-17]
- move to using pregenerated PDF docs to cure multilib conflicts (#222721)

[1.5-16]
- update backport of the preauth module interface (part of #194654)

[1.5-14]
- apply fixes from Tom Yu for MITKRB5-SA-2006-002 (CVE-2006-6143) (#218456)
- apply fixes from Tom Yu for MITKRB5-SA-2006-003 (CVE-2006-6144) (#218456)

[1.5-12]
- update backport of the preauth module interface

* Mon Oct 30 2006 Nalin Dahyabhai
- update backport of the preauth module interface
- add proposed patches 4566, 4567
- add proposed edata reporting interface for KDC
- add temporary placeholder for module global context fixes

[1.5-11]
- don't bail from the KDC init script if there's no database, it may be in
a different location than the default (fenlason)
- remove the [kdc] section from the default krb5.conf -- doesn't seem to have
been applicable for a while

[1.5-10]
- rename krb5.sh and krb5.csh so that they don't overlap (#210623)
- way-late application of added error info in kadmind.init (#65853)

[1.5-9.pal_18695]
- add backport of in-development preauth module interface (#208643)

[1.5-9]
- provide docs in PDF format instead of as tex source (Enrico Scholz, #209943)

[1.5-8]
- add missing shebang headers to krsh and krlogin wrapper scripts (#209238)

[1.5-7]
- set SS_LIB at configure-time so that libss-using apps get working readline
support (#197044)

[1.5-6]
- switch to the updated patch for MITKRB-SA-2006-001

[1.5-5]
- apply patch to address MITKRB-SA-2006-001 (CVE-2006-3084)

[1.5-4]
- ensure that the gssapi library's been initialized before walking the
internal mechanism list in gss_release_oid(), needed if called from
gss_release_name() right after a gss_import_name() (#198092)

[1.5-3]
- rebuild

[1.5-2]
- pull up latest revision of patch to reduce lockups in rsh/rshd

[1.5-1.2]
- rebuild

[1.5-1.1]
- rebuild

[1.5-1]
- build

[1.5-0]
- update to 1.5

[1.4.3-9]
- mark profile.d config files noreplace (Laurent Rineau, #196447)

[1.4.3-8]
- add buildprereq for autoconf

[1.4.3-7]
- further munge krb5-config so that 'libdir=/usr/lib' is given even on 64-bit
architectures, to avoid multilib conflicts; other changes will conspire to
strip out the -L flag which uses this, so it should be harmless (#192692)

[1.4.3-6]
- adjust the patch which removes the use of rpath to also produce a
krb5-config which is okay in multilib environments (#190118)
- make the name-of-the-tempfile comment which compile_et adds to error code
headers always list the same file to avoid conflicts on multilib installations
- strip SIZEOF_LONG out of krb5.h so that it doesn't conflict on multilib boxes
- strip GSS_SIZEOF_LONG out of gssapi.h so that it doesn't conflict on mulitlib
boxes

[1.4.3-5]
- Fix formatting typo in kinit.1 (krb5-kinit-man-typo.patch)

[1.4.3-4.1]
- bump again for double-long bug on ppc(64)

[1.4.3-4]
- give a little bit more information to the user when kinit gets the catch-all
I/O error (#180175)

[1.4.3-3]
- rebuild properly when pthread_mutexattr_setrobust_np() is defined but not
declared, such as with recent glibc when _GNU_SOURCE isn't being used

[1.4.3-2]
- Use full paths in krb5.sh to avoid path lookups

* Fri Dec 09 2005 Jesse Keating
- rebuilt

* Thu Dec 01 2005 Nalin Dahyabhai
- login: don't truncate passwords before passing them into crypt(), in
case they're significant (#149476)

[1.4.3-1]
- update to 1.4.3
- make ksu setuid again (#137934, others)

[1.4.2-4]
- mark %{krb5prefix}/man so that files which are packaged within it are
flagged as %doc (#168163)

[1.4.2-3]
- add an xinetd configuration file for encryption-only telnetd, parallelling
the kshell/ekshell pair (#167535)

[1.4.2-2]
- change the default configured encryption type for KDC databases to the
compiled-in default of des3-hmac-sha1 (#57847)

[1.4.2-1]
- update to 1.4.2, incorporating the fixes for MIT-KRB5-SA-2005-002 and
MIT-KRB5-SA-2005-003

[1.4.1-6]
- rebuild

[1.4.1-5]
- fix telnet client environment variable disclosure the same way NetKit's
telnet client did (CAN-2005-0488) (#159305)
- keep apps which call krb5_principal_compare() or krb5_realm_compare() with
malformed or NULL principal structures from crashing outright (Thomas Biege)
(#161475)

* Tue Jun 28 2005 Nalin Dahyabhai
- apply fixes from draft of MIT-KRB5-SA-2005-002 (CAN-2005-1174,CAN-2005-1175)
(#157104)
- apply fixes from draft of MIT-KRB5-SA-2005-003 (CAN-2005-1689) (#159755)

[1.4.1-4]
- fix double-close in keytab handling
- add port of fixes for CAN-2004-0175 to krb5-aware rcp (#151612)

[1.4.1-3]
- prevent spurious EBADF in krshd when stdin is closed by the client while
the command is running (#151111)

[1.4.1-2]
- add deadlock patch, removed old patch

[1.4.1-1]
- update to 1.4.1, incorporating fixes for CAN-2005-0468 and CAN-2005-0469
- when starting the KDC or kadmind, if KRB5REALM is set via the /etc/sysconfig
file for the service, pass it as an argument for the -r flag

[1.4-3]
- drop krshd patch for now

* Thu Mar 17 2005 Nalin Dahyabhai
- add draft fix from Tom Yu for slc_add_reply() buffer overflow (CAN-2005-0469)
- add draft fix from Tom Yu for env_opt_add() buffer overflow (CAN-2005-0468)

[1.4-2]
- don't include into the telnet client when we're not using curses

[1.4-1]
- update to 1.4
- v1.4 kadmin client requires a v1.4 kadmind on the server, or use the '-O'
flag to specify that it should communicate with the server using the older
protocol
- new libkrb5support library
- v5passwdd and kadmind4 are gone
- versioned symbols
- pick up from /etc/sysconfig/krb5kdc, if it exists, and pass
it on to krb5kdc
- pick up from /etc/sysconfig/kadmin, if it exists, and pass
it on to kadmind
- pick up from /etc/sysconfig/krb524, if it exists, and pass
it on to krb524d *instead of* '-m'
- set 'forwardable' in [libdefaults] in the default krb5.conf to match the
default setting which we supply for pam_krb5
- set a default of 24h for 'ticket_lifetime' in [libdefaults], reflecting the
compiled-in default

[1.3.6-3]
- rebuild

[1.3.6-2]
- rebuild

[1.3.6-1]
- update to 1.3.6, which includes the previous fix

[1.3.5-8]
- apply fix from Tom Yu for MITKRB5-SA-2004-004 (CAN-2004-1189)

[1.3.5-7]
- fix deadlock during file transfer via rsync/krsh
- thanks goes to James Antill for hint

[1.3.5-6]
- rebuild

[1.3.5-3]
- fix predictable-tempfile-name bug in krb5-send-pr (CAN-2004-0971, #140036)

* Tue Nov 16 2004 Nalin Dahyabhai
- silence compiler warning in kprop by using an in-memory ccache with a fixed
name instead of an on-disk ccache with a name generated by tmpnam()

[1.3.5-2]
- fix globbing patch port mode (#139075)

[1.3.5-1]
- fix segfault in telnet due to incorrect checking of gethostbyname_r result
codes (#129059)

* Fri Oct 15 2004 Nalin Dahyabhai
- remove rc4-hmac:norealm and rc4-hmac:onlyrealm from the default list of
supported keytypes in kdc.conf -- they produce exactly the same keys as
rc4-hmac:normal because rc4 string-to-key ignores salts
- nuke kdcrotate -- there are better ways to balance the load on KDCs, and
the SELinux policy for it would have been scary-looking
- update to 1.3.5, mainly to include MITKRB5SA 2004-002 and 2004-003

[1.3.4-7]
- rebuild

[1.3.4-6]
- rebuild

[1.3.4-5]
- incorporate revised fixes from Tom Yu for CAN-2004-0642, CAN-2004-0644,
CAN-2004-0772

[1.3.4-4]
- rebuild

[1.3.4-3]
- incorporate fixes from Tom Yu for CAN-2004-0642, CAN-2004-0772
(MITKRB5-SA-2004-002, #130732)
- incorporate fixes from Tom Yu for CAN-2004-0644 (MITKRB5-SA-2004-003, #130732)

[1.3.4-2]
- fix indexing error in server sorting patch (#127336)

* Tue Jun 15 2004 Elliot Lee
- rebuilt

[1.3.4-0.1]
- update to 1.3.4 final

[1.3.4-0]
- update to 1.3.4 beta1
- remove MITKRB5-SA-2004-001, included in 1.3.4

[1.3.3-8]
- rebuild

[1.3.3-7]
- rebuild

[1.3.3-6]
- apply updated patch from MITKRB5-SA-2004-001 (revision 2004-06-02)

[1.3.3-5]
- rebuild

[1.3.3-4]
- apply patch from MITKRB5-SA-2004-001 (#125001)

[1.3.3-3]
- removed rpath

[1.3.3-2]
- re-enable large file support, fell out in 1.3-1
- patch rcp to use long long and %lld format specifiers when reporting file
sizes on large files

[1.3.3-1]
- update to 1.3.3

[1.3.2-1]
- update to 1.3.2

[1.3.1-12]
- rebuild

[1.3.1-11.1]
- rebuilt

[1.3.1-11]
- rebuilt

[1.3.1-10]
- catch krb4 send_to_kdc cases in kdc preference patch

[1.3.1-9]
- remove patch to set TERM in klogind which, combined with the upstream fix in
1.3.1, actually produces the bug now (#114762)

[1.3.1-8]
- when iterating over lists of interfaces which are 'up' from getifaddrs(),
skip over those which have no address (#113347)

* Mon Jan 12 2004 Nalin Dahyabhai
- prefer the kdc which last replied to a request when sending requests to kdcs

[1.3.1-7]
- fix combination of --with-netlib and --enable-dns (#82176)

* Tue Nov 18 2003 Nalin Dahyabhai
- remove libdefault ticket_lifetime option from the default krb5.conf, it is
ignored by libkrb5

[1.3.1-6]
- fix bug in patch to make rlogind start login with a clean environment a la
netkit rlogin, spotted and fixed by Scott McClung

[1.3.1-5]
- include profile.d scriptlets in krb5-devel so that krb5-config will be in
the path if krb5-workstation isn't installed, reported by Kir Kolyshkin

* Mon Sep 08 2003 Nalin Dahyabhai
- add more etypes (arcfour) to the default enctype list in kdc.conf
- don't apply previous patch, refused upstream

[1.3.1-4]
- fix 32/64-bit bug storing and retrieving the issue_date in v4 credentials

[1.3.1-3]
- Don't check for write access on /etc/krb5.conf if SELinux

[1.3.1-2]
- fixup some int/pointer varargs wackiness

[1.3.1-1]
- rebuild

[1.3.1-0]
- update to 1.3.1

[1.3-2]
- pull fix for non-compliant encoding of salt field in etype-info2 preauth
data from 1.3.1 beta 1, until 1.3.1 is released.

[1.3-1]
- update to 1.3

[1.2.8-4]
- correctly use stdargs

[1.3-0.beta.4]
- test update to 1.3 beta 4
- ditch statglue build option
- krb5-devel requires e2fsprogs-devel, which now provides libss and libcom_err

* Wed Jun 04 2003 Elliot Lee
- rebuilt

[1.2.8-2]
- gcc 3.3 doesn't implement varargs.h, include stdarg.h instead

[1.2.8-1]
- update to 1.2.8

[1.2.7-14]
- fix double-free of enc_part2 in krb524d

[1.2.7-13]
- update to latest patch kit for MITKRB5-SA-2003-004

[1.2.7-12]
- add patch included in MITKRB5-SA-2003-003 (CAN-2003-0028)

[1.2.7-11]
- add patches from patchkit from MITKRB5-SA-2003-004 (CAN-2003-0138 and
CAN-2003-0139)

[1.2.7-10]
- rebuild

[1.2.7-9]
- fix buffer underrun in unparsing certain principals (CAN-2003-0082)

[1.2.7-8]
- add patch to document the reject-bad-transited option in kdc.conf

* Mon Feb 03 2003 Nalin Dahyabhai
- add patch to fix server-side crashes when principals have no
components (CAN-2003-0072)

[1.2.7-7]
- add patch from Mark Cox for exploitable bugs in ftp client

* Wed Jan 22 2003 Tim Powers
- rebuilt

[1.2.7-5]
- use PICFLAGS when building code from the ktany patch

[1.2.7-4]
- debloat

[1.2.7-3]
- include .so.* symlinks as well as .so.*.*

[1.2.7-2]
- always #include to access errno, never do it directly
- enable LFS on a bunch of other 32-bit arches

* Wed Dec 04 2002 Nalin Dahyabhai
- increase the maximum name length allowed by kuserok() to the higher value
used in development versions

* Mon Dec 02 2002 Nalin Dahyabhai
- install src/krb524/README as README.krb524 in the -servers package,
includes information about converting for AFS principals

[1.2.7-1]
- update to 1.2.7
- disable use of tcl

* Mon Nov 11 2002 Nalin Dahyabhai
- update to 1.2.7-beta2 (internal only, not for release), dropping dnsparse
and kadmind4 fixes

[1.2.6-5]
- add patch for buffer overflow in kadmind4 (not used by default)

[1.2.6-4]
- drop a hunk from the dnsparse patch which is actually redundant (thanks to
Tom Yu)

[1.2.6-3]
- patch to handle truncated dns responses

[1.2.6-2]
- remove hashless key types from the default kdc.conf, they're not supposed to
be there, noted by Sam Hartman on krbdev

[1.2.6-1]
- update to 1.2.6

[1.2.5-7]
- use %{_lib} for the sake of multilib systems

[1.2.5-6]
- add patch from Tom Yu for exploitable bugs in rpc code used in kadmind

[1.2.5-5]
- fix bug in krb5.csh which would cause the path check to always succeed

[1.2.5-4]
- build even libdb.a with -fPIC and .

* Fri Jun 21 2002 Tim Powers
- automated rebuild

* Sun May 26 2002 Tim Powers
- automated rebuild

[1.2.5-1]
- update to 1.2.5
- disable statglue

[1.2.4-1]
- update to 1.2.4

[1.2.3-5]
- rebuild in new environment
- reenable statglue

* Sat Jan 26 2002 Florian La Roche
- prereq chkconfig for the server subpackage

[1.2.3-3]
- build without -g3, which gives us large static libraries in -devel

[1.2.3-2]
- reintroduce ld.so.conf munging in the -libs %post

[1.2.3-1]
- rename the krb5 package back to krb5-libs; the previous rename caused
something of an uproar
- update to 1.2.3, which includes the FTP and telnetd fixes
- configure without --enable-dns-for-kdc --enable-dns-for-realm, which now set
the default behavior instead of enabling the feature (the feature is enabled
by --enable-dns, which we still use)
- reenable optimizations on Alpha
- support more encryption types in the default kdc.conf (heads-up from post
to comp.protocols.kerberos by Jason Heiss)

[1.2.2-14]
- rename the krb5-libs package to krb5 (naming a subpackage -libs when there
is no main package is silly)
- move defaults for PAM to the appdefaults section of krb5.conf -- this is
the area where the krb5_appdefault_* functions look for settings)
- disable statglue (warning: breaks binary compatibility with previous
packages, but has to be broken at some point to work correctly with
unpatched versions built with newer versions of glibc)

[1.2.2-13]
- bump release number and rebuild

* Wed Aug 01 2001 Nalin Dahyabhai
- add patch to fix telnetd vulnerability

* Fri Jul 20 2001 Nalin Dahyabhai
- tweak statglue.c to fix stat/stat64 aliasing problems
- be cleaner in use of gcc to build shlibs

* Wed Jul 11 2001 Nalin Dahyabhai
- use gcc to build shared libraries

* Wed Jun 27 2001 Nalin Dahyabhai
- add patch to support 'ANY' keytab type (i.e.,
'default_keytab_name = ANY:FILE:/etc/krb5.keytab,SRVTAB:/etc/srvtab'
patch from Gerald Britton, #42551)
- build with -D_FILE_OFFSET_BITS=64 to get large file I/O in ftpd (#30697)
- patch ftpd to use long long and %lld format specifiers to support the SIZE
command on large files (also #30697)
- don't use LOG_AUTH as an option value when calling openlog() in ksu (#45965)
- implement reload in krb5kdc and kadmind init scripts (#41911)
- lose the krb5server init script (not using it any more)

* Sun Jun 24 2001 Elliot Lee
- Bump release + rebuild.

* Tue May 29 2001 Nalin Dahyabhai
- pass some structures by address instead of on the stack in krb5kdc

* Tue May 22 2001 Nalin Dahyabhai
- rebuild in new environment

* Thu Apr 26 2001 Nalin Dahyabhai
- add patch from Tom Yu to fix ftpd overflows (#37731)

* Wed Apr 18 2001 Than Ngo
- disable optimizations on the alpha again

* Fri Mar 30 2001 Nalin Dahyabhai
- add in glue code to make sure that libkrb5 continues to provide a
weak copy of stat()

* Thu Mar 15 2001 Nalin Dahyabhai
- build alpha with -O0 for now

* Thu Mar 08 2001 Nalin Dahyabhai
- fix the kpropd init script

* Mon Mar 05 2001 Nalin Dahyabhai
- update to 1.2.2, which fixes some bugs relating to empty ETYPE-INFO
- re-enable optimization on Alpha

* Thu Feb 08 2001 Nalin Dahyabhai
- build alpha with -O0 for now
- own %{_var}/kerberos

* Tue Feb 06 2001 Nalin Dahyabhai
- own the directories which are created for each package (#26342)

* Tue Jan 23 2001 Nalin Dahyabhai
- gettextize init scripts

* Fri Jan 19 2001 Nalin Dahyabhai
- add some comments to the ksu patches for the curious
- re-enable optimization on alphas

* Mon Jan 15 2001 Nalin Dahyabhai
- fix krb5-send-pr (#18932) and move it from -server to -workstation
- buildprereq libtermcap-devel
- temporariliy disable optimization on alphas
- gettextize init scripts

* Tue Dec 05 2000 Nalin Dahyabhai
- force -fPIC

* Fri Dec 01 2000 Nalin Dahyabhai
- rebuild in new environment

* Tue Oct 31 2000 Nalin Dahyabhai
- add bison as a BuildPrereq (#20091)

* Mon Oct 30 2000 Nalin Dahyabhai
- change /usr/dict/words to /usr/share/dict/words in default kdc.conf (#20000)

* Thu Oct 05 2000 Nalin Dahyabhai
- apply kpasswd bug fixes from David Wragg

* Wed Oct 04 2000 Nalin Dahyabhai
- make krb5-libs obsolete the old krb5-configs package (#18351)
- don't quit from the kpropd init script if there's no principal database so
that you can propagate the first time without running kpropd manually
- don't complain if /etc/ld.so.conf doesn't exist in the -libs %post

* Tue Sep 12 2000 Nalin Dahyabhai
- fix credential forwarding problem in klogind (goof in KRB5CCNAME handling)
(#11588)
- fix heap corruption bug in FTP client (#14301)

* Wed Aug 16 2000 Nalin Dahyabhai
- fix summaries and descriptions
- switched the default transfer protocol from PORT to PASV as proposed on
bugzilla (#16134), and to match the regular ftp package's behavior

* Wed Jul 19 2000 Jeff Johnson
- rebuild to compress man pages.

* Sat Jul 15 2000 Bill Nottingham
- move initscript back

* Fri Jul 14 2000 Nalin Dahyabhai
- disable servers by default to keep linuxconf from thinking they need to be
started when they don't

* Thu Jul 13 2000 Prospector
- automatic rebuild

* Mon Jul 10 2000 Nalin Dahyabhai
- change cleanup code in post to not tickle chkconfig
- add grep as a Prereq: for -libs

* Thu Jul 06 2000 Nalin Dahyabhai
- move condrestarts to postun
- make xinetd configs noreplace
- add descriptions to xinetd configs
- add /etc/init.d as a prereq for the -server package
- patch to properly truncate dumb in krlogind

* Fri Jun 30 2000 Nalin Dahyabhai
- update to 1.2.1
- back out Tom Yu's patch, which is a big chunk of the 1.2 -> 1.2.1 update
- start using the official source tarball instead of its contents

* Thu Jun 29 2000 Nalin Dahyabhai
- Tom Yu's patch to fix compatibility between 1.2 kadmin and 1.1.1 kadmind
- pull out 6.2 options in the spec file (sonames changing in 1.2 means it's not
compatible with other stuff in 6.2, so no need)

* Wed Jun 28 2000 Nalin Dahyabhai
- tweak graceful start/stop logic in post and preun

* Mon Jun 26 2000 Nalin Dahyabhai
- update to the 1.2 release
- ditch a lot of our patches which went upstream
- enable use of DNS to look up things at build-time
- disable use of DNS to look up things at run-time in default krb5.conf
- change ownership of the convert-config-files script to root.root
- compress PS docs
- fix some typos in the kinit man page
- run condrestart in server post, and shut down in preun

* Mon Jun 19 2000 Nalin Dahyabhai
- only remove old krb5server init script links if the init script is there

* Sat Jun 17 2000 Nalin Dahyabhai
- disable kshell and eklogin by default

* Thu Jun 15 2000 Nalin Dahyabhai
- patch mkdir/rmdir problem in ftpcmd.y
- add condrestart option to init script
- split the server init script into three pieces and add one for kpropd

* Wed Jun 14 2000 Nalin Dahyabhai
- make sure workstation servers are all disabled by default
- clean up krb5server init script

* Fri Jun 09 2000 Nalin Dahyabhai
- apply second set of buffer overflow fixes from Tom Yu
- fix from Dirk Husung for a bug in buffer cleanups in the test suite
- work around possibly broken rev binary in running test suite
- move default realm configs from /var/kerberos to %{_var}/kerberos

* Tue Jun 06 2000 Nalin Dahyabhai
- make ksu and v4rcp owned by root

* Sat Jun 03 2000 Nalin Dahyabhai
- use %{_infodir} to better comply with FHS
- move .so files to -devel subpackage
- tweak xinetd config files (bugs #11833, #11835, #11836, #11840)
- fix package descriptions again

* Wed May 24 2000 Nalin Dahyabhai
- change a LINE_MAX to 1024, fix from Ken Raeburn
- add fix for login vulnerability in case anyone rebuilds without krb4 compat
- add tweaks for byte-swapping macros in krb.h, also from Ken
- add xinetd config files
- make rsh and rlogin quieter
- build with debug to fix credential forwarding
- add rsh as a build-time req because the configure scripts look for it to
determine paths

* Wed May 17 2000 Nalin Dahyabhai
- fix config_subpackage logic

* Tue May 16 2000 Nalin Dahyabhai
- remove setuid bit on v4rcp and ksu in case the checks previously added
don't close all of the problems in ksu
- apply patches from Jeffrey Schiller to fix overruns Chris Evans found
- reintroduce configs subpackage for use in the errata
- add PreReq: sh-utils

* Mon May 15 2000 Nalin Dahyabhai
- fix double-free in the kdc (patch merged into MIT tree)
- include convert-config-files script as a documentation file

* Wed May 03 2000 Nalin Dahyabhai
- patch ksu man page because the -C option never works
- add access() checks and disable debug mode in ksu
- modify default ksu build arguments to specify more directories in CMD_PATH
and to use getusershell()

* Wed May 03 2000 Bill Nottingham
- fix configure stuff for ia64

* Mon Apr 10 2000 Nalin Dahyabhai
- add LDCOMBINE=-lc to configure invocation to use libc versioning (bug #10653)
- change Requires: for/in subpackages to include %{version}

* Wed Apr 05 2000 Nalin Dahyabhai
- add man pages for kerberos(1), kvno(1), .k5login(5)
- add kvno to -workstation

* Mon Apr 03 2000 Nalin Dahyabhai
- Merge krb5-configs back into krb5-libs. The krb5.conf file is marked as
a %config file anyway.
- Make krb5.conf a noreplace config file.

* Thu Mar 30 2000 Nalin Dahyabhai
- Make klogind pass a clean environment to children, like NetKit's rlogind does.

* Wed Mar 08 2000 Nalin Dahyabhai
- Don't enable the server by default.
- Compress info pages.
- Add defaults for the PAM module to krb5.conf

* Mon Mar 06 2000 Nalin Dahyabhai
- Correct copyright: it's exportable now, provided the proper paperwork is
filed with the government.

* Fri Mar 03 2000 Nalin Dahyabhai
- apply Mike Friedman's patch to fix format string problems
- don't strip off argv[0] when invoking regular rsh/rlogin

* Thu Mar 02 2000 Nalin Dahyabhai
- run kadmin.local correctly at startup

* Mon Feb 28 2000 Nalin Dahyabhai
- pass absolute path to kadm5.keytab if/when extracting keys at startup

* Sat Feb 19 2000 Nalin Dahyabhai
- fix info page insertions

* Wed Feb 09 2000 Nalin Dahyabhai
- tweak server init script to automatically extract kadm5 keys if
/var/kerberos/krb5kdc/kadm5.keytab doesn't exist yet
- adjust package descriptions

* Thu Feb 03 2000 Nalin Dahyabhai
- fix for potentially gzipped man pages

* Fri Jan 21 2000 Nalin Dahyabhai
- fix comments in krb5-configs

* Fri Jan 07 2000 Nalin Dahyabhai
- move /usr/kerberos/bin to end of PATH

* Tue Dec 28 1999 Nalin Dahyabhai
- install kadmin header files

* Tue Dec 21 1999 Nalin Dahyabhai
- patch around TIOCGTLC defined on alpha and remove warnings from libpty.h
- add installation of info docs
- remove krb4 compat patch because it doesn't fix workstation-side servers

* Mon Dec 20 1999 Nalin Dahyabhai
- remove hesiod dependency at build-time

* Sun Dec 19 1999 Nalin Dahyabhai
- rebuild on 1.1.1

* Thu Oct 07 1999 Nalin Dahyabhai
- clean up init script for server, verify that it works [jlkatz]
- clean up rotation script so that rc likes it better
- add clean stanza

* Mon Oct 04 1999 Nalin Dahyabhai
- backed out ncurses and makeshlib patches
- update for krb5-1.1
- add KDC rotation to rc.boot, based on ideas from Michael's C version

* Mon Sep 27 1999 Nalin Dahyabhai
- added -lncurses to telnet and telnetd makefiles

* Mon Jul 05 1999 Nalin Dahyabhai
- added krb5.csh and krb5.sh to /etc/profile.d

* Tue Jun 22 1999 Nalin Dahyabhai
- broke out configuration files

* Mon Jun 14 1999 Nalin Dahyabhai
- fixed server package so that it works now

* Sat May 15 1999 Nalin Dahyabhai
- started changelog (previous package from zedz.net)
- updated existing 1.0.5 RPM from Eos Linux to krb5 1.0.6
- added --force to makeinfo commands to skip errors during build


Related CVEs


CVE-2024-37370
CVE-2024-37371

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_aarch64_latest
krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_aarch64_optional_latest
krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_aarch64_u9_patch
krb5-devel-1.15.1-55.0.3.el7_9.aarch64.rpm11dae1b0ed0f59890991472e29799f80-ol7_aarch64_latest
krb5-devel-1.15.1-55.0.3.el7_9.aarch64.rpm11dae1b0ed0f59890991472e29799f80-ol7_aarch64_u9_patch
krb5-libs-1.15.1-55.0.3.el7_9.aarch64.rpm2a076e7c426f4a2e3b38274c256b190b-ol7_aarch64_latest
krb5-libs-1.15.1-55.0.3.el7_9.aarch64.rpm2a076e7c426f4a2e3b38274c256b190b-ol7_aarch64_u9_patch
krb5-pkinit-1.15.1-55.0.3.el7_9.aarch64.rpm5a8c62fbe953dc3b801a4e9d61bba7d6-ol7_aarch64_latest
krb5-pkinit-1.15.1-55.0.3.el7_9.aarch64.rpm5a8c62fbe953dc3b801a4e9d61bba7d6-ol7_aarch64_u9_patch
krb5-server-1.15.1-55.0.3.el7_9.aarch64.rpm81e5f665fc819fbfa54bd08f5df1c549-ol7_aarch64_latest
krb5-server-1.15.1-55.0.3.el7_9.aarch64.rpm81e5f665fc819fbfa54bd08f5df1c549-ol7_aarch64_u9_patch
krb5-server-ldap-1.15.1-55.0.3.el7_9.aarch64.rpm7f8e6ad9e1abef96a9e0a4f64bb2415f-ol7_aarch64_latest
krb5-server-ldap-1.15.1-55.0.3.el7_9.aarch64.rpm7f8e6ad9e1abef96a9e0a4f64bb2415f-ol7_aarch64_u9_patch
krb5-workstation-1.15.1-55.0.3.el7_9.aarch64.rpm785af965e592787258abf3e404114c2d-ol7_aarch64_latest
krb5-workstation-1.15.1-55.0.3.el7_9.aarch64.rpm785af965e592787258abf3e404114c2d-ol7_aarch64_u9_patch
libkadm5-1.15.1-55.0.3.el7_9.aarch64.rpm040cf85ea335c07ca53486ebb5e9bb2b-ol7_aarch64_latest
libkadm5-1.15.1-55.0.3.el7_9.aarch64.rpm040cf85ea335c07ca53486ebb5e9bb2b-ol7_aarch64_u9_patch
Oracle Linux 7 (x86_64) krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_x86_64_latest
krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_x86_64_optional_latest
krb5-1.15.1-55.0.3.el7_9.src.rpm0f0158424a87d47105fba1f9841a446c-ol7_x86_64_u9_patch
krb5-devel-1.15.1-55.0.3.el7_9.i686.rpmfa7ab2bdcc5e7cf42cfaee7b8a52fe17-ol7_x86_64_latest
krb5-devel-1.15.1-55.0.3.el7_9.i686.rpmfa7ab2bdcc5e7cf42cfaee7b8a52fe17-ol7_x86_64_u9_patch
krb5-devel-1.15.1-55.0.3.el7_9.x86_64.rpm9d622979c9c7812efe409d8f4bc7bd61-ol7_x86_64_latest
krb5-devel-1.15.1-55.0.3.el7_9.x86_64.rpm9d622979c9c7812efe409d8f4bc7bd61-ol7_x86_64_u9_patch
krb5-libs-1.15.1-55.0.3.el7_9.i686.rpmb5d972bc75000aa170c4f0d43a92ae67-ol7_x86_64_latest
krb5-libs-1.15.1-55.0.3.el7_9.i686.rpmb5d972bc75000aa170c4f0d43a92ae67-ol7_x86_64_u9_patch
krb5-libs-1.15.1-55.0.3.el7_9.x86_64.rpm35513d45e416f0be1d019bd50730dadf-ol7_x86_64_latest
krb5-libs-1.15.1-55.0.3.el7_9.x86_64.rpm35513d45e416f0be1d019bd50730dadf-ol7_x86_64_u9_patch
krb5-pkinit-1.15.1-55.0.3.el7_9.x86_64.rpmbb5a303428e8b6ba001208db0b38c654-ol7_x86_64_latest
krb5-pkinit-1.15.1-55.0.3.el7_9.x86_64.rpmbb5a303428e8b6ba001208db0b38c654-ol7_x86_64_u9_patch
krb5-server-1.15.1-55.0.3.el7_9.x86_64.rpma8fa3c7b56446b77ed06e6bbb38130c5-ol7_x86_64_latest
krb5-server-1.15.1-55.0.3.el7_9.x86_64.rpma8fa3c7b56446b77ed06e6bbb38130c5-ol7_x86_64_u9_patch
krb5-server-ldap-1.15.1-55.0.3.el7_9.x86_64.rpmf9bfecb5617c859642e036e66925267f-ol7_x86_64_latest
krb5-server-ldap-1.15.1-55.0.3.el7_9.x86_64.rpmf9bfecb5617c859642e036e66925267f-ol7_x86_64_u9_patch
krb5-workstation-1.15.1-55.0.3.el7_9.x86_64.rpmd4220240f841fb56794a14f398b8be3b-ol7_x86_64_latest
krb5-workstation-1.15.1-55.0.3.el7_9.x86_64.rpmd4220240f841fb56794a14f398b8be3b-ol7_x86_64_u9_patch
libkadm5-1.15.1-55.0.3.el7_9.i686.rpm5c7e0ecf1b37371f32a6393f49886acf-ol7_x86_64_latest
libkadm5-1.15.1-55.0.3.el7_9.i686.rpm5c7e0ecf1b37371f32a6393f49886acf-ol7_x86_64_u9_patch
libkadm5-1.15.1-55.0.3.el7_9.x86_64.rpm0d32e548996b5ef72fbbade9aeaac6e7-ol7_x86_64_latest
libkadm5-1.15.1-55.0.3.el7_9.x86_64.rpm0d32e548996b5ef72fbbade9aeaac6e7-ol7_x86_64_u9_patch


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete