Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: krb5-mini-devel | Distribution: openSUSE Tumbleweed |
Version: 1.21.3 | Vendor: openSUSE |
Release: 1.2 | Build date: Mon Jul 1 09:50:59 2024 |
Group: Unspecified | Build host: reproducible |
Size: 723681 | Source RPM: krb5-mini-1.21.3-1.2.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://kerberos.org/dist/ | |
Summary: Development files for MIT Kerberos5 (openSUSE mini variant) |
Kerberos V5 is a trusted-third-party network authentication system, which can improve network security by eliminating the insecure practice of cleartext passwords. This package includes Libraries and Include Files for Development
MIT
* Mon Jul 01 2024 Samuel Cabrero <scabrero@suse.de> - Update to 1.21.3 * Fix vulnerabilities in GSS message token handling: * CVE-2024-37370, bsc#1227186 * CVE-2024-37371, bsc#1227187 * Fix a potential bad pointer free in krb5_cccol_have_contents() * Fix a memory leak in the macOS ccache type - Update patch 0009-Fix-three-memory-leaks.patch * Fri Mar 22 2024 Samuel Cabrero <scabrero@suse.de> - Fix memory leaks, add patch 0009-Fix-three-memory-leaks.patch * CVE-2024-26458, bsc#1220770 * CVE-2024-26461, bsc#1220771 * CVE-2024-26462, bsc#1220772 * Thu Feb 29 2024 Pedro Monreal <pmonreal@suse.com> - Add crypto-policies support [bsc#1211301] * Update krb5.conf in vendor-files.tar.bz2 * Tue Oct 03 2023 Dominique Leuenberger <dimstar@opensuse.org> - Add explicit this-is-only-for-build-envs requires to krb5-mini and krb5-mini-devel: the mini flavors are currently excluded using special hacks from the FTP Tree. In order to eliminate this hack, we need to ensure the packages are not viable for real installations. We achieve this with a dep that is never provided, but ignored by OBS. * Thu May 04 2023 Frederic Crozat <fcrozat@suse.com> - Add _multibuild to define additional spec files as additional flavors. Eliminates the need for source package links in OBS. * Thu Mar 23 2023 Dominique Leuenberger <dimstar@opensuse.org> - Build mini flavor without keyutils support: breaks cycle between krb5-mini and keyutils. * Fri Mar 03 2023 Samuel Cabrero <scabrero@suse.de> - Update 0007-SELinux-integration.patch for SELinux 3.5; (bsc#1208887); * Tue Dec 13 2022 Samuel Cabrero <scabrero@suse.de> - Drop 0009-Fix-KDC-null-deref-on-TGS-inner-body-null-server.patch, already fixed in release 1.20.0 * Wed Nov 16 2022 Samuel Cabrero <scabrero@suse.de> - Update to 1.20.1; (bsc#1205126); (CVE-2022-42898); * Fix integer overflows in PAC parsing [CVE-2022-42898]. * Fix null deref in KDC when decoding invalid NDR. * Fix memory leak in OTP kdcpreauth module. * Fix PKCS11 module path search. * Sun May 29 2022 Dirk Müller <dmueller@suse.com> - update to 1.20.0: * Added a "disable_pac" realm relation to suppress adding PAC authdata to tickets, for realms which do not need to support S4U requests. * Most credential cache types will use atomic replacement when a cache is reinitialized using kinit or refreshed from the client keytab. * kprop can now propagate databases with a dump size larger than 4GB, if both the client and server are upgraded. * kprop can now work over NATs that change the destination IP address, if the client is upgraded. * Updated the KDB interface. The sign_authdata() method is replaced with the issue_pac() method, allowing KDB modules to add logon info and other buffers to the PAC issued by the KDC. * Host-based initiator names are better supported in the GSS krb5 mechanism. * Replaced AD-SIGNEDPATH authdata with minimal PACs. * To avoid spurious replay errors, password change requests will not be attempted over UDP until the attempt over TCP fails. * PKINIT will sign its CMS messages with SHA-256 instead of SHA-1. * Updated all code using OpenSSL to be compatible with OpenSSL 3. * Reorganized the libk5crypto build system to allow the OpenSSL back-end to pull in material from the builtin back-end depending on the OpenSSL version. * Simplified the PRNG logic to always use the platform PRNG. * Converted the remaining Tcl tests to Python. * Sat Apr 09 2022 Dirk Müller <dmueller@suse.com> - update to 1.19.3 (bsc#1189929, CVE-2021-37750): * Fix a denial of service attack against the KDC [CVE-2021-37750]. * Fix KDC null deref on TGS inner body null server * Fix conformance issue in GSSAPI tests * Thu Jan 27 2022 David Mulder <dmulder@suse.com> - Resolve "Credential cache directory /run/user/0/krb5cc does not exist while opening default credentials cache" by using a kernel keyring instead of a dir cache; (bsc#1109830); * Thu Sep 30 2021 Johannes Segitz <jsegitz@suse.com> - Added hardening to systemd services; (bsc#1181400); * Mon Aug 30 2021 Samuel Cabrero <scabrero@suse.de> - Fix KDC null pointer dereference via a FAST inner body that lacks a server field; (CVE-2021-37750); (bsc#1189929); - Added patches: * 0009-Fix-KDC-null-deref-on-TGS-inner-body-null-server.patch * Mon Aug 02 2021 Samuel Cabrero <scabrero@suse.de> - Update to 1.19.2 * Fix a denial of service attack against the KDC encrypted challenge code; (CVE-2021-36222); * Fix a memory leak when gss_inquire_cred() is called without a credential handle. * Thu Apr 22 2021 Samuel Cabrero <scabrero@suse.de> - Use /run instead of /var/run for daemon PID files; (bsc#1185163); * Fri Feb 19 2021 Samuel Cabrero <scabrero@suse.de> - Update to 1.19.1 * Fix a linking issue with Samba. * Better support multiple pkinit_identities values by checking whether certificates can be loaded for each value. * Fri Feb 05 2021 Samuel Cabrero <scabrero@suse.de> - Update to 1.19 Administrator experience * When a client keytab is present, the GSSAPI krb5 mech will refresh credentials even if the current credentials were acquired manually. * It is now harder to accidentally delete the K/M entry from a KDB. Developer experience * gss_acquire_cred_from() now supports the "password" and "verify" options, allowing credentials to be acquired via password and verified using a keytab key. * When an application accepts a GSS security context, the new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor both provided matching channel bindings. * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests to identify the desired client principal by certificate. * PKINIT certauth modules can now cause the hw-authent flag to be set in issued tickets. * The krb5_init_creds_step() API will now issue the same password expiration warnings as krb5_get_init_creds_password(). Protocol evolution * Added client and KDC support for Microsoft's Resource-Based Constrained Delegation, which allows cross-realm S4U2Proxy requests. A third-party database module is required for KDC support. * kadmin/admin is now the preferred server principal name for kadmin connections, and the host-based form is no longer created by default. The client will still try the host-based form as a fallback. * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT extension, which causes channel bindings to be required for the initiator if the acceptor provided them. The client will send this option if the client_aware_gss_bindings profile option is set. User experience * kinit will now issue a warning if the des3-cbc-sha1 encryption type is used in the reply. This encryption type will be deprecated and removed in future releases. * Added kvno flags --out-cache, --no-store, and --cached-only (inspired by Heimdal's kgetcred).
/usr/bin/krb5-config /usr/include/gssapi /usr/include/gssapi.h /usr/include/gssapi/gssapi.h /usr/include/gssapi/gssapi_alloc.h /usr/include/gssapi/gssapi_ext.h /usr/include/gssapi/gssapi_generic.h /usr/include/gssapi/gssapi_krb5.h /usr/include/gssapi/mechglue.h /usr/include/gssrpc /usr/include/gssrpc/auth.h /usr/include/gssrpc/auth_gss.h /usr/include/gssrpc/auth_gssapi.h /usr/include/gssrpc/auth_unix.h /usr/include/gssrpc/clnt.h /usr/include/gssrpc/netdb.h /usr/include/gssrpc/pmap_clnt.h /usr/include/gssrpc/pmap_prot.h /usr/include/gssrpc/pmap_rmt.h /usr/include/gssrpc/rename.h /usr/include/gssrpc/rpc.h /usr/include/gssrpc/rpc_msg.h /usr/include/gssrpc/svc.h /usr/include/gssrpc/svc_auth.h /usr/include/gssrpc/types.h /usr/include/gssrpc/xdr.h /usr/include/kadm5 /usr/include/kadm5/admin.h /usr/include/kadm5/chpass_util_strings.h /usr/include/kadm5/kadm_err.h /usr/include/kdb.h /usr/include/krad.h /usr/include/krb5 /usr/include/krb5.h /usr/include/krb5/ccselect_plugin.h /usr/include/krb5/certauth_plugin.h /usr/include/krb5/clpreauth_plugin.h /usr/include/krb5/hostrealm_plugin.h /usr/include/krb5/kadm5_auth_plugin.h /usr/include/krb5/kadm5_hook_plugin.h /usr/include/krb5/kdcpolicy_plugin.h /usr/include/krb5/kdcpreauth_plugin.h /usr/include/krb5/krb5.h /usr/include/krb5/localauth_plugin.h /usr/include/krb5/locate_plugin.h /usr/include/krb5/plugin.h /usr/include/krb5/preauth_plugin.h /usr/include/krb5/pwqual_plugin.h /usr/include/profile.h /usr/lib/libgssrpc.so /usr/lib/libk5crypto.so /usr/lib/libkadm5clnt.so /usr/lib/libkadm5clnt_mit.so /usr/lib/libkadm5srv.so /usr/lib/libkadm5srv_mit.so /usr/lib/libkdb5.so /usr/lib/libkrad.so /usr/lib/libkrb5.so /usr/lib/libkrb5support.so /usr/lib/pkgconfig/gssrpc.pc /usr/lib/pkgconfig/kadm-client.pc /usr/lib/pkgconfig/kadm-server.pc /usr/lib/pkgconfig/kdb.pc /usr/lib/pkgconfig/krb5-gssapi.pc /usr/lib/pkgconfig/krb5.pc /usr/lib/pkgconfig/mit-krb5-gssapi.pc /usr/lib/pkgconfig/mit-krb5.pc /usr/sbin/krb5-send-pr /usr/share/aclocal /usr/share/aclocal/ac_check_krb5.m4 /usr/share/man/man1/krb5-config.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Nov 16 01:07:39 2024