Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: krb5-server | Distribution: CentOS |
Version: 1.20.1 | Vendor: CentOS |
Release: 8.el9 | Build date: Wed Feb 22 18:11:19 2023 |
Group: Unspecified | Build host: x86-02.stream.rdu2.redhat.com |
Size: 784493 | Source RPM: krb5-1.20.1-8.el9.src.rpm |
Packager: builder@centos.org | |
Url: https://web.mit.edu/kerberos/www/ | |
Summary: The KDC and related programs for Kerberos 5 |
Kerberos is a network authentication system. The krb5-server package contains the programs that must be installed on a Kerberos 5 key distribution center (KDC). If you are installing a Kerberos 5 KDC, you need to install this package (in other words, most people should NOT install this package).
MIT
* Wed Feb 22 2023 Julien Rische <jrische@redhat.com> - 1.20.1-8 - Fix datetime parsing in kadmin on s390x - Resolves: rhbz#2169985 * Tue Feb 14 2023 Julien Rische <jrische@redhat.com> - 1.20.1-7 - Fix double free on kdb5_util key creation failure - Resolves: rhbz#2166603 * Tue Jan 31 2023 Julien Rische <jrische@redhat.com> - 1.20.1-6 - Add support for MS-PAC extended KDC signature (CVE-2022-37967) - Resolves: rhbz#2165827 * Thu Jan 19 2023 Julien Rische <jrische@redhat.com> - 1.20.1-5 - Bypass FIPS restrictions to use KRB5KDF in case AES SHA-1 HMAC is enabled - Lazily load MD4/5 from OpenSSL if using RADIUS or RC4 enctype in FIPS mode - Resolves: rhbz#2162461 * Thu Jan 12 2023 Julien Rische <jrische@redhat.com> - 1.20.1-4 - Set aes256-cts-hmac-sha384-192 as EXAMLE.COM master key in kdc.conf - Add AES SHA-2 HMAC family as EXAMPLE.COM supported etypes in kdc.conf - Resolves: rhbz#2068535 * Tue Jan 10 2023 Julien Rische <jrische@redhat.com> - 1.20.1-2 - Strip debugging data from ksu executable file - Resolves: rhbz#2159643 * Wed Dec 07 2022 Julien Rische <jrische@redhat.com> - 1.20.1-1 - Make tests compatible with sssd-client - Resolves: rhbz#2151513 - Remove invalid password expiry warning - Resolves: rhbz#2121099 - Update error checking for OpenSSL CMS_verify - Resolves: rhbz#2063838 - New upstream version (1.20.1) - Resolves: rhbz#2016312 - Fix integer overflows in PAC parsing (CVE-2022-42898) - Resolves: rhbz#2140971 * Tue Oct 18 2022 Julien Rische <jrische@redhat.com> - 1.19.1-23 - Fix kprop for propagating dump files larger than 4GB - Resolves: rhbz#2133014 * Fri Jul 08 2022 Julien Rische <jrische@redhat.com> - 1.19.1-22 - Restore "supportedCMSTypes" attribute in PKINIT preauth requests - Set SHA-512 or SHA-256 with RSA as preferred CMS signature algorithms - Resolves: rhbz#2068935 * Thu Jun 23 2022 Julien Rische <jrische@redhat.com> - 1.19.1-21 - Fix libkrad client cleanup - Allow use of larger RADIUS attributes in krad library - Resolves: rhbz#2100351 * Thu May 12 2022 Julien Rische <jrische@redhat.com> - 1.19.1-20 - Fix OpenSSL 3 MD5 encyption in FIPS mode - Allow libkrad UDP/TCP connection to localhost in FIPS mode - Resolves: rhbz#2068458 * Mon May 02 2022 Julien Rische <jrische@redhat.com> - 1.19.1-19 - Use p11-kit as default PKCS11 module - Resolves: rhbz#2030981 * Tue Apr 26 2022 Julien Rische <jrische@redhat.com> - 1.19.1-18 - Try harder to avoid password change replay errors - Resolves: rhbz#2075186 * Mon Mar 14 2022 Julien Rische <jrische@redhat.com> - 1.19.1-15 - Use SHA-256 instead of SHA-1 for PKINIT CMS digest * Thu Feb 24 2022 Julien Rische <jrische@redhat.com> - 1.19.1-14 - Bypass FIPS restrictions to use KRB5KDF in case AES SHA-1 HMAC is enabled - Lazily load MD4/5 from OpenSSL if using RADIUS or RC4 enctype in FIPS mode * Fri Dec 17 2021 Antonio Torres <antorres@redhat.com> - 1.19.1-13 - Remove -specs= from krb5-config output - Resolves #1997021 * Wed Oct 20 2021 Antonio Torres <antorres@redhat.com> - 1.19.1-12 - Fix KDC null deref on TGS inner body null server (CVE-2021-37750) - Resolves: #1997602 * Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 1.19.1-11.1 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Tue Jul 20 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-11 - Fix KDC null deref on bad encrypted challenge (CVE-2021-36222) - Resolves: #1983733 * Wed Jul 14 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-10 - Update OpenSSL 3 provider handling to clean up properly - Resolves: #1955873 * Mon Jun 21 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-9 - Sync openssl3 patches with upstream - Resolves: #1955873 * Thu Jun 17 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-8 - Rebuild for rpminspect and mass rebuild cleanup; no code changes - Resolves: #1967505 * Thu Jun 17 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-7 - Fix several fallback canonicalization problems - Resolves: #1967505 * Tue Jun 15 2021 Mohan Boddu <mboddu@redhat.com> - 1.19.1-6.1 - Rebuilt for RHEL 9 BETA for openssl 3.0 - Resolves: rhbz#1971065 * Thu Jun 10 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-6 - Backport KCM retrieval fixes - Resolves: #1956403 * Thu May 20 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-5 - Fix DES3 mention in KDFs - Resolves: #1955873 * Wed May 19 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-4 - Port to OpenSSL 3 (alpha 15) - Resolves: #1955873 * Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 1.19.1-3.1 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Mon Mar 01 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-3 - Further test dependency fixes; no code changes * Mon Mar 01 2021 Robbie Harwood <rharwood@redhat.com> - 1.19.1-2 - Make test dependencies contingent on skipcheck; no code changes
/etc/logrotate.d/kadmind /etc/logrotate.d/krb5kdc /etc/sysconfig/kadmin /etc/sysconfig/kprop /etc/sysconfig/krb5kdc /usr/bin/sclient /usr/lib/.build-id /usr/lib/.build-id/03 /usr/lib/.build-id/03/fa9fd9b674ee18678ca777963b34918fba993d /usr/lib/.build-id/05 /usr/lib/.build-id/05/f8065929404ff305c09dde3d233d024c581077 /usr/lib/.build-id/32 /usr/lib/.build-id/32/5f3596666bd21147339cebcdfb53c308dafd4e /usr/lib/.build-id/44 /usr/lib/.build-id/44/bfa26c4e3a9cff8b620ef8955eac059a05c0de /usr/lib/.build-id/62 /usr/lib/.build-id/62/8ac308f83cd4af0d577390b4170d83b751ee1a /usr/lib/.build-id/a4 /usr/lib/.build-id/a4/4cb70950463de66bcb897a554d970c781b89b0 /usr/lib/.build-id/a5 /usr/lib/.build-id/a5/3084a59a56337334914bd9647b2d94a7611482 /usr/lib/.build-id/b2 /usr/lib/.build-id/b2/6833a612904ae3e83cdf101322e932df3ebc14 /usr/lib/.build-id/bb /usr/lib/.build-id/bb/9c87fa48136cd68834ea50891e71ceb2a55d29 /usr/lib/.build-id/bd /usr/lib/.build-id/bd/aa24a4db27682e9704122ef59d8a66119f9d72 /usr/lib/.build-id/c4 /usr/lib/.build-id/c4/40915aeecbe05bc10975658163e965ce6c1f6f /usr/lib/.build-id/d8 /usr/lib/.build-id/d8/33b726fa8102050eb3114250284ea7c0486b40 /usr/lib/systemd/system/kadmin.service /usr/lib/systemd/system/kprop.service /usr/lib/systemd/system/krb5kdc.service /usr/lib/tmpfiles.d/krb5-krb5kdc.conf /usr/lib64/krb5 /usr/lib64/krb5/plugins /usr/lib64/krb5/plugins/authdata /usr/lib64/krb5/plugins/kdb /usr/lib64/krb5/plugins/kdb/db2.so /usr/lib64/krb5/plugins/kdb/klmdb.so /usr/lib64/krb5/plugins/preauth /usr/lib64/krb5/plugins/preauth/otp.so /usr/sbin/kadmin.local /usr/sbin/kadmind /usr/sbin/kdb5_util /usr/sbin/kprop /usr/sbin/kpropd /usr/sbin/kproplog /usr/sbin/krb5kdc /usr/sbin/sserver /usr/share/doc/krb5-server /usr/share/doc/krb5-server/kdc.conf /usr/share/man/man1/sclient.1.gz /usr/share/man/man5/kadm5.acl.5.gz /usr/share/man/man5/kdc.conf.5.gz /usr/share/man/man8/kadmin.local.8.gz /usr/share/man/man8/kadmind.8.gz /usr/share/man/man8/kdb5_util.8.gz /usr/share/man/man8/kprop.8.gz /usr/share/man/man8/kpropd.8.gz /usr/share/man/man8/kproplog.8.gz /usr/share/man/man8/krb5kdc.8.gz /usr/share/man/man8/sserver.8.gz /var/kerberos /var/kerberos/krb5kdc /var/kerberos/krb5kdc/kadm5.acl /var/kerberos/krb5kdc/kdc.conf /var/run/krb5kdc
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jan 7 08:54:30 2025