Change logs for krb5 source package in Trusty

  • krb5 (1.12+dfsg-2ubuntu5.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: DoS (out-of-bounds read) via a crafted string
        - debian/patches/CVE-2015-8629.patch: Verify decode kadmin C strings
        - CVE-2015-8629
      * SECURITY UPDATE: DoS (NULL pointer dereference) by specifying KADM5_POLICY
        with a NULL policy name
        - debian/patches/CVE-2015-8630.patch: Check for null kadm5 policy name
        - CVE-2015-8630
      * SECURITY UPDATE: DoS (memory consumption) via a request specifying a NULL
        principal name
        - debian/patches/CVE-2015-8631.patch: Fix leaks in kadmin server stubs
        - CVE-2015-8631
      * SECURITY UPDATE: DoS (NULL pointer dereference) via a crafted request to
        modify a principal
        - debian/patches/CVE-2016-3119.patch: Fix LDAP null dereference on
          empty arg
        - CVE-2016-3119
      * SECURITY UPDATE: DoS (NULL pointer dereference) via an S4U2Self request
        - debian/patches/CVE-2016-3120.patch: Fix S4U2Self KDC crash when anon
          is restricted
        - CVE-2016-3120
      * SECURITY UPDATE: KDC assertion failure
        - debian/patches/CVE-2017-11368-1.patch: Prevent KDC unset status
          assertion failures
        - debian/patches/CVE-2017-11368-2.patch: Simplify KDC status assignment
        - CVE-2017-11368
      * SECURITY UPDATE: Double free vulnerability
        - debian/patches/CVE-2017-11462.patch: Preserve GSS context on init/accept
          failure
        - CVE-2017-11462
      * SECURITY UPDATE: Authenticated kadmin with permission to add principals
        to an LDAP Kerberos can DoS or bypass DN container check.
        - debian/patches/CVE-2018-5729-CVE-2018-5730.patch: Fix flaws in LDAP DN
          checking
        - CVE-2018-5729
        - CVE-2018-5730
    
     -- Eduardo Barretto <email address hidden>  Wed, 09 Jan 2019 14:01:22 -0200
  • krb5 (1.12+dfsg-2ubuntu5.3) trusty; urgency=medium
    
      * d/p/upstream/0001-Add-SPNEGO-special-case-for-NTLMSSP-MechListMIC.patch:
        Cherry-pick from upstream to add SPNEGO special case for
        NTLMSSP+MechListMIC.  LP: #1643708.
    
     -- Steve Langasek <email address hidden>  Mon, 21 Nov 2016 18:14:47 -0800
  • krb5 (1.12+dfsg-2ubuntu5.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via incorrect null bytes
        - d/p/0030-Fix-krb5_read_message-handling-CVE-2014-5355.patch:
          properly handle null bytes in src/appl/user_user/server.c,
          src/lib/krb5/krb/recvauth.c.
        - CVE-2015-5355
      * SECURITY UPDATE: preauthentication requirement bypass in kdcpreauth
        - d/p/0031-Prevent-requires_preauth-bypass-CVE-2015-2694.patch:
          improve logic in src/plugins/preauth/otp/main.c,
          src/plugins/preauth/pkinit/pkinit_srv.c.
        - CVE-2015-2694
      * SECURITY UPDATE: SPNEGO context aliasing bugs
        - d/p/0031-Fix-SPNEGO-context-aliasing-bugs-CVE-2015-2695.patch:
          improve logic in src/lib/gssapi/spnego/gssapiP_spnego.h,
          src/lib/gssapi/spnego/spnego_mech.c.
        - d/p/0036-Fix-SPNEGO-context-import.patch: fix SPNEGO context import
          in src/lib/gssapi/spnego/spnego_mech.c.
        - CVE-2015-2695
      * SECURITY UPDATE: IAKERB context aliasing bugs
        - d/p/0032-Fix-IAKERB-context-aliasing-bugs-CVE-2015-2696.patch:
          improve logic in src/lib/gssapi/krb5/gssapiP_krb5.h,
          src/lib/gssapi/krb5/gssapi_krb5.c, src/lib/gssapi/krb5/iakerb.c.
        - d/p/0034-Fix-two-IAKERB-comments.patch: fix comments in
          src/lib/gssapi/krb5/iakerb.c.
        - CVE-2015-2696
      * SECURITY UPDATE: KDC crash via invalid string processing
        - d/p/0033-Fix-build_principal-memory-bug-CVE-2015-2697.patch:
          use k5memdup0() instead of strdup() in src/lib/krb5/krb/bld_princ.c.
        - CVE-2015-2697
      * SECURITY UPDATE: memory corruption in IAKERB context export/import
        - d/p/0035-Fix-IAKERB-context-export-import-CVE-2015-2698.patch:
          dereferencing the context_handle pointer before casting it in
          and implement implement an IAKERB gss_import_sec_context() function
          in src/lib/gssapi/krb5/gssapiP_krb5.h,
          src/lib/gssapi/krb5/gssapi_krb5.c, src/lib/gssapi/krb5/iakerb.c.
        - CVE-2015-2698
    
     -- Marc Deslauriers <email address hidden>  Wed, 11 Nov 2015 09:08:08 -0500
  • krb5 (1.12+dfsg-2ubuntu5.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: ticket forging via old keys
        - debian/patches/CVE-2014-5321.patch: return only new keys in
          src/lib/kadm5/srv/svr_principal.c.
        - CVE-2014-5321
      * SECURITY UPDATE: use-after-free and double-free memory access
        violations
        - debian/patches/CVE-2014-5352.patch: properly handle context deletion
          in src/lib/gssapi/krb5/context_time.c,
          src/lib/gssapi/krb5/export_sec_context.c,
          src/lib/gssapi/krb5/gssapiP_krb5.h,
          src/lib/gssapi/krb5/gssapi_krb5.c,
          src/lib/gssapi/krb5/inq_context.c,
          src/lib/gssapi/krb5/k5seal.c,
          src/lib/gssapi/krb5/k5sealiov.c,
          src/lib/gssapi/krb5/k5unseal.c,
          src/lib/gssapi/krb5/k5unsealiov.c,
          src/lib/gssapi/krb5/lucid_context.c,
          src/lib/gssapi/krb5/prf.c,
          src/lib/gssapi/krb5/process_context_token.c,
          src/lib/gssapi/krb5/wrap_size_limit.c.
        - CVE-2014-5352
      * SECURITY UPDATE: denial of service via LDAP query with no results
        - debian/patches/CVE-2014-5353.patch: properly handle policy name in
          src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c.
        - CVE-2014-5353
      * SECURITY UPDATE: denial of service via database entry for a keyless
        principal
        - debian/patches/CVE-2014-5354.patch: support keyless principals in
          src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c.
        - CVE-2014-5354
      * SECURITY UPDATE: denial of service or code execution in kadmind XDR
        data processing
        - debian/patches/CVE-2014-9421.patch: fix double free in
          src/lib/kadm5/kadm_rpc_xdr.c, src/lib/rpc/auth_gssapi_misc.c.
        - CVE-2014-9421
      * SECURITY UPDATE: impersonation attack via two-component server
        principals
        - debian/patches/CVE-2014-9422.patch: fix kadmind server validation in
          src/kadmin/server/kadm_rpc_svc.c.
        - CVE-2014-9422
      * SECURITY UPDATE: gssrpc data leakage
        - debian/patches/CVE-2014-9423.patch: fix leakage in
          src/lib/gssapi/mechglue/mglueP.h, src/lib/rpc/svc_auth_gss.c.
        - CVE-2014-9423
     -- Marc Deslauriers <email address hidden>   Fri, 06 Feb 2015 15:26:22 -0500
  • krb5 (1.12+dfsg-2ubuntu5) trusty; urgency=low
    
      * Use ADD_METHOD_NOLOOP rather than ADD_METHOD for new GSS-API entry
        points, avoids infinite recursive loop when a mechanism doesn't
        provide an entry point and does include  calls back into the mechglue
        (LP: #1326500)
      * Make libkadm5srv-mit8 be arch: any multi-arch: same to work around
        upgrade bug (LP: #1334052)
      * Use tailq macros to work around GCC 4.8 optimizer bug and prevent
        infinite loop for database propagation (LP: #1347147)
     -- Sam Hartman <email address hidden>   Wed, 30 Jul 2014 21:06:49 -0400
  • krb5 (1.12+dfsg-2ubuntu4.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via invalid tokens
        - debian/patches/CVE-2014-4341-4342.patch: handle invalid tokens in
          src/lib/gssapi/krb5/k5unseal.c, src/lib/gssapi/krb5/k5unsealiov.c.
        - CVE-2014-4341
        - CVE-2014-4342
      * SECURITY UPDATE: denial of service via double-free in SPNEGO
        - debian/patches/CVE-2014-4343.patch: fix double-free in
          src/lib/gssapi/spnego/spnego_mech.c.
        - CVE-2014-4343
      * SECURITY UPDATE: denial of service via null deref in SPNEGO acceptor
        - debian/patches/CVE-2014-4344.patch: validate REMAIN in
          src/lib/gssapi/spnego/spnego_mech.c.
        - CVE-2014-4344
      * SECURITY UPDATE: denial of service and possible code execution in
        kadmind with LDAP backend
        - debian/patches/CVE-2014-4345.patch: fix off-by-one in
          src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
        - CVE-2014-4345
     -- Marc Deslauriers <email address hidden>   Fri, 08 Aug 2014 14:58:49 -0400
  • krb5 (1.12+dfsg-2ubuntu4) trusty; urgency=low
    
      * Add transitional libkadm5srv-mit8 package to help libapt
        calculating the upgrade (LP: #1304403) to trusty.
        This transitional package can be dropped once trusty is
        released.
     -- Michael Vogt <email address hidden>   Wed, 09 Apr 2014 11:11:43 +0200
  • krb5 (1.12+dfsg-2ubuntu3) trusty; urgency=medium
    
      * Add missing versioned Replaces: libkadm5srv-mit8 to the libkdb5-7 package.
        Fixes upgrades from trusty. (LP: #1304403)
     -- Martin Pitt <email address hidden>   Tue, 08 Apr 2014 18:04:14 +0200
  • krb5 (1.12+dfsg-2ubuntu2) trusty; urgency=medium
    
      * debian/rules: force -O2 to work around build failure with -O3.
     -- Adam Conrad <email address hidden>   Mon, 17 Feb 2014 08:50:33 +0000
  • krb5 (1.12+dfsg-2ubuntu1) trusty; urgency=low
    
      * Merge from Debian unstable. Remaining changes:
        - Add alternate dependency on libverto-libevent1 as that's the
          package ABI name in ubuntu.
    
    krb5 (1.12+dfsg-2) unstable; urgency=low
    
      * Split out libkrad-dev into its own package, Closes: #735323
    
    krb5 (1.12+dfsg-1) experimental; urgency=low
    
      [ Benjamin Kaduk ]
      * New upstream release (closes: #730085, #728845, #637662, #729291).
      * Update HURD compatibility patch (closes: #729191).
      * Move pkgconfig files to krb5-multidev and avoid conflicts with
        heimdal (closes: #730267).
    
    krb5 (1.12~alpha1+dfsg-1) experimental; urgency=low
    
      [ Benjamin Kaduk ]
      * New upstream release, Closes: #694988, #697954
      * Build-depend on python-lxml, Closes: #725596
      * Remove Debian versions from symbols
      * Add myself to uploaders
    
      [ Sam Hartman ]
      * Build-depend on libverto-dev 0.2.4 to get verto_set_flags
    
    krb5 (1.11.3+dfsg-3+nmu1) unstable; urgency=high
    
      * Non-maintainer upload by the Security Team.
      * Add python-lxml build dependency (closes: #725596).
      * Fix cve-2013-1417: KDC daemon crash condition (closes: #730085).
      * Fix cve-2013-1418: null pointer dereference issue (closes: #728845).
     -- Timo Aaltonen <email address hidden>   Tue, 04 Feb 2014 14:29:23 +0200
  • krb5 (1.11.3+dfsg-3ubuntu2) trusty; urgency=low
    
      * Add alternate dependency on libverto-libevent1 as that's the package
        ABI name in ubuntu.
     -- Dmitrijs Ledkovs <email address hidden>   Sun, 10 Nov 2013 02:20:12 +0000
  • krb5 (1.11.3+dfsg-3ubuntu1) trusty; urgency=low
    
      * Add build dependency on python-lxml. Closes: #725596.
    
    krb5 (1.11.3+dfsg-3) unstable; urgency=low
    
      [ Benjamin Kaduk ]
      * Update config.sub and config.guess, patch from upstream, Closes: #717840
      * Update Brazillian Portugese Translation, thanks Fernando Ike,
        Closes: #719726
      * Bump the version of the gssrpc_clnt_create symbol.  The routine itself
        was changed in a backwards-compatible way, but callers from the kadm5
        libraries were changed to rely on the new behavior, Closes: #718275
      * Add symbols files for the kadm5 libraries.  The KADM5 API version number
        was increased for the 1.11 release but the corresponding library sonames
        were not, so we must indicate the behavior change ourself, Closes: #716772
    
      [ Sam Hartman ]
      * krb5-kdc depends on libverto-libev1, work around for #652699
      * Remove krb5-kdc conflict since it's more than one release cycle old
      * Add Benjamin Kaduk to uploaders
    
    krb5 (1.11.3+dfsg-2) experimental; urgency=low
    
      * Run autoreconf to update configure based on aclocal patch
    
    krb5 (1.11.3+dfsg-1) experimental; urgency=low
    
      *  New upstream version
          - Turns out 1.11.2+dfsg didn't include the pingpong fix, but this
        does , Closes: #
    
    krb5 (1.11.2+dfsg-2) experimental; urgency=low
    
      * Import upstream's patch to not warn or error on variadic macros,
        Closes: #709824
    
    krb5 (1.11.2+dfsg-1) experimental; urgency=low
    
      * New upstream version, Closes: #697662
          - By not depending on texinfo, we avoid FTBFSing from its changes,
          Closes: #708711
      * Fix "usage of keytabs gives "Generic preauthentication failure while
        getting initial credentials"" via upstream change to prefer keys in
        the keytab
        (Closes: #698534)
      * Fixed upstream "kerberos password policy attributes missing from
        kerberos.schema"  (Closes:
        #655381)
      * Remove arch-dep and arch-indep dependency in rules  (Closes: #708973)
     -- Matthias Klose <email address hidden>   Wed, 23 Oct 2013 18:47:25 +0200
  • krb5 (1.11.3+dfsg-3) unstable; urgency=low
    
    
      [ Benjamin Kaduk ]
      * Update config.sub and config.guess, patch from upstream, Closes: #717840
      * Update Brazillian Portugese Translation, thanks Fernando Ike,
        Closes: #719726
      * Bump the version of the gssrpc_clnt_create symbol.  The routine itself
        was changed in a backwards-compatible way, but callers from the kadm5
        libraries were changed to rely on the new behavior, Closes: #718275
      * Add symbols files for the kadm5 libraries.  The KADM5 API version number
        was increased for the 1.11 release but the corresponding library sonames
        were not, so we must indicate the behavior change ourself, Closes: #716772
    
      [ Sam Hartman ]
      * krb5-kdc depends on libverto-libev1, work around for #652699
      * Remove krb5-kdc conflict since it's more than one release cycle old
      * Add Benjamin Kaduk to uploaders
    
     -- Sam Hartman <email address hidden>  Sun, 25 Aug 2013 16:48:53 -0400
  • krb5 (1.10.1+dfsg-6.1ubuntu1) saucy; urgency=low
    
      * Update config.{guess,sub} for Aarch64.
     -- Matthias Klose <email address hidden>   Tue, 23 Jul 2013 22:15:04 +0200