Kerberos 5 Release 1.13.3
    
    
    The MIT Kerberos Team announces the availability of the
      krb5-1.13.3 release.  The detached PGP
      signature is available without going through the download
      page, if you wish to verify the authenticity of a distribution
      you have obtained elsewhere.
    
Please see the README file for a
      more complete list of changes.
    
You may also see the current full
      list
	of fixed bugs tracked in our RT bugtracking system.
    
DES transition
    The Data Encryption Standard (DES) is widely recognized as
      weak.  The krb5-1.7 release contains measures to encourage sites
      to migrate away from using single-DES cryptosystems.  Among
      these is a configuration variable that enables "weak" enctypes,
      which now defaults to "false" beginning with krb5-1.8.
    
Major changes in 1.13.3 (2015-12-04)
    
      This is a bug fix release.  The krb5-1.13 release series is in
      maintenance, and for new deployments, installers should prefer
      the krb5-1.14 release series or later.
    
      - Fix memory aliasing issues in SPNEGO and IAKERB mechanisms
	that could cause server crashes. [CVE-2015-2695]
	[CVE-2015-2696] [CVE-2015-2698]
      
- Fix build_principal memory bug that could cause a KDC
	crash. [CVE-2015-2697]
      
- Allow an iprop slave to receive full resyncs from KDCs
	running krb5-1.10 or earlier.
    
Major changes in 1.13.2 (2015-05-08)
    This is a bug fix release.
    
      - Fix a minor vulnerability in krb5_read_message, which is primarily
	used in the BSD-derived kcmd suite of applications.  [CVE-2014-5355]
      
- Fix a bypass of requires_preauth in KDCs that have PKINIT enabled.
	[CVE-2015-2694]
      
- Fix some issues with the LDAP KDC database back end.
      
- Fix an iteration-related memory leak in the DB2 KDC database back
	end.
      
- Fix issues with some less-used kadm5.acl functionality.
      
- Improve documentation.
    
Major changes in 1.13.1 (2015-02-11)
    This is a bug fix release.
    
      - Fix multiple vulnerabilities in the LDAP KDC back end.
	[CVE-2014-5354] [CVE-2014-5353]
      
- Fix multiple kadmind vulnerabilities, some of which are
	based in the gssrpc library. [CVE-2014-5352 CVE-2014-5352
	CVE-2014-9421 CVE-2014-9422 CVE-2014-9423]
    
Major changes in 1.13 (2014-10-15)
    
      - Administrator experience:
      
- 
	
	  - Add support for accessing KDCs via an HTTPS proxy server
	    using the MS-KKDCP protocol.
	  
- Add support for hierarchical incremental propagation,
	    where slaves can act as intermediates between an upstream
	    master and other downstream slaves.
	  
- Add support for configuring GSS mechanisms using
	    /etc/gss/mech.d/*.conf files in addition to /etc/gss/mech.
	  
- Add support to the LDAP KDB module for binding to the
	    LDAP server using SASL.
	  
- The KDC listens for TCP connections by default.
	  
- Fix a minor key disclosure vulnerability where using the
	    "keepold" option to the kadmin randkey operation could
	    return the old keys.  [CVE-2014-5351]
	
 
- User experience:
      
- 
	
	  - Add client support for the Kerberos Cache Manager
	    protocol. If the host is running a Heimdal kcm daemon,
	    caches served by the daemon can be accessed with the KCM:
	    cache type.
	  
- When built on OS X 10.7 and higher, use "KCM:" as the
	    default cache type, unless overridden by command-line
	    options or krb5-config values.
	
 
- Performance:
      
- 
	
	  - Add support for doing unlocked database dumps for the
	    DB2 KDC back end, which would allow the KDC and kadmind to
	    continue accessing the database during lengthy database
	    dumps.
	
 
You may retrieve the Kerberos 5 Release 1.13.3 source from
      here.
      If you need to acquire the sources from some other distribution
      site, you may verify them against the detached
      PGP signature for krb5-1.13.3.
    
    $Id: krb5-1.13.3.html,v 1.1 2015/12/04 21:17:30 tlyu Exp $
    MIT Kerberos
    [ home ]
    [ contact ]