Skip to content

Commit

Permalink
Updates for krb5-1.12.2
Browse files Browse the repository at this point in the history
  • Loading branch information
tlyu committed Aug 11, 2014
1 parent d1702d5 commit 64fca79
Show file tree
Hide file tree
Showing 28 changed files with 605 additions and 495 deletions.
103 changes: 103 additions & 0 deletions README
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,103 @@ from using single-DES cryptosystems. Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.

Major changes in 1.12.2 (2014-08-11)
------------------------------------

* Work around a gcc optimizer bug that could cause DB2 KDC database
operations to spin in an infinite loop

* Fix a backward compatibility problem with the LDAP KDB schema that
could prevent krb5-1.11 and later from decoding entries created by
krb5-1.6.

* Avoid an infinite loop under some circumstances when the GSS
mechglue loads a dynamic mechanism.

* Fix krb5kdc argument parsing so "-w" and "-r" options work together
reliably.

* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
invalid memory reference vulnerabilities. [CVE-2014-4341
CVE-2014-4342]

* Fix memory management vulnerabilities in GSSAPI SPNEGO.
[CVE-2014-4343 CVE-2014-4344]

* Fix buffer overflow vulnerability in LDAP KDB back end.
[CVE-2014-4345]

krb5-1.12.2 changes by ticket ID
--------------------------------

3277 configure --sysconfdir=/etc can make redundant entries in
profile search paths
7793 preauth context leaks on failure
7818 Clean up rcache if GSS krb5 acquire_cred fails
7820 gss_init_sec_context() can ignore time sync with keyring
caches
7822 Avoid assertion failure in error_message
7836 Allow empty store in gss_acquire_cred_from
7839 Reinitialize ulog when wrapping serial number
7849 kdc.conf(5) - 1.11 / 1.12 - inaccurate
re. iprop_master_ulogsize
7853 Check for unstable ulog in ulog_get_entries
7854 Fix kpropd -x
7856 Support referrals from Windows Server 2003
7858 SPNEGO server responds incorrectly to Microsoft krb5 mech type
7860 libdb2 tests hang
7862 ksu broken with 2FA principals
7864 Update doc build instructions
7865 kdb5_util doc update: -update with -ov dump not needed since
-r13
7866 improper malloc() handling in process_chpw_request()
7870 Conditionalize use of LDAP_OPT_DEBUG_LEVEL
7872 GSS krb5 sequence number checking fails on initial gap token
7874 Initialize err variable in krb5_sendto_kdc
7875 Fix memory leak in krb5_verify_init_creds
7876 Mention k5login_authoritative in k5login docs
7878 Fix unlikely double free in PKINIT client code
7881 Fix returning KDB_NOENTRY in find_alternate_tgs()
7890 Update example kadmin getprinc enctype display
7894 Get getopt from unistd.h (not getopt.h) in tests
7897 Fix leak in kadm5_flush with LDAP KDB
7902 Check for asprintf failure in kdb5_util create
7911 OTP RADIUS tries one too few times and times out too quickly
7912 Fix invalid JSON handling in KDC OTP module
7914 Problem with krb5int_c_combine_keys()
7916 pkinit doesn't handle slotid parameter properly
7917 pkinit doesn't deal with token label properly
7919 LDAP key data encoder/decoder does not treat KrbKey salt as
optional
7920 Change example module name in host_config.rst
7924 tcl_kadm5.c is incompatible with Tcl 8.6
7926 1.12 breaks gssapi mechanisms that recursively call into
libgssapi
7928 Do not document pkinit_mapping_file
7930 Add missing profile functions to libkrb5 exports
7931 Improve PKINIT certificate documentation
7932 Do not document pkinit_win2k
7941 Fix several memory leaks in LDAP KDB modules
7943 Fix error checking in PKINIT authdata creation
7945 krb5kdc -w and -r do not work together
7946 Consolidate DB option documentation
7948 Fix unlikely null dereference in mk_cred()
7949 Handle invalid RFC 1964 tokens [CVE-2014-4341 CVE-2014-4342]
7952 Fix unlikely null dereference in TGS client code
7954 Remove indent workaround in man page RST sources
7955 Fix build on systems without RTM_OLD*
7966 Fix leak on GSS module symbol resolution error
7967 Error when building with "make -j8"
7969 Double-free in initiator during SPNEGO renegotiation
[CVE-2014-4343]
7970 NULL dereference in SPNEGO acceptor for continuation tokens
[CVE-2014-4344]
7971 Fix deleted node handling in libprofile
7972 Fix creation/rename of top-level profile sections
7973 Bad calloc test in krb5_authdata_context_init()
7980 LDAP key data segmentation buffer overflow [CVE-2014-4345]
7982 Use zapfree in krb5_decrypt_tkt_part

Major changes in 1.12.1 (2014-01-15)
------------------------------------

Expand Down Expand Up @@ -440,9 +537,12 @@ reports, suggestions, and valuable resources:
Holger Isenberg
Pavel Jindra
Joel Johnson
Anders Kaseorg
W. Trevor King
Mikkel Kruse
Reinhard Kugler
Tomas Kuthan
Pierre Labastie
Volker Lendecke
Jan iankko Lieskovsky
Oliver Loch
Expand Down Expand Up @@ -474,6 +574,7 @@ reports, suggestions, and valuable resources:
Robert Relyea
Martin Rex
Jason Rogers
Nate Rosenblum
Mike Roszkowski
Guillaume Rousse
Tom Shaw
Expand All @@ -485,6 +586,7 @@ reports, suggestions, and valuable resources:
Bjørn Tore Sund
Joe Travaglini
Rathor Vipin
Denis Vlasenko
Jorgen Wahlsten
Stef Walter
Max (Weijun) Wang
Expand All @@ -499,6 +601,7 @@ reports, suggestions, and valuable resources:
Nicolas Williams
Ross Wilper
Augustin Wolf
David Woodhouse
Xu Qiang
Nickolai Zeldovich
Hanz van Zijst
Expand Down
8 changes: 4 additions & 4 deletions src/man/k5identity.man
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
.TH "K5IDENTITY" "5" " " "1.12.1" "MIT Kerberos"
.\" Man page generated from reStructuredText.
.
.TH "K5IDENTITY" "5" " " "1.12.2" "MIT Kerberos"
.SH NAME
k5identity \- Kerberos V5 client principal selection rules
.
Expand Down Expand Up @@ -28,8 +30,6 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
.\" Man page generated from reStructuredText.
.
.SH DESCRIPTION
.sp
The .k5identity file, which resides in a user\(aqs home directory,
Expand Down Expand Up @@ -98,6 +98,6 @@ kerberos(1), \fIkrb5.conf(5)\fP
.SH AUTHOR
MIT
.SH COPYRIGHT
1985-2013, MIT
1985-2014, MIT
.\" Generated by docutils manpage writer.
.
17 changes: 11 additions & 6 deletions src/man/k5login.man
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
.TH "K5LOGIN" "5" " " "1.12.1" "MIT Kerberos"
.\" Man page generated from reStructuredText.
.
.TH "K5LOGIN" "5" " " "1.12.2" "MIT Kerberos"
.SH NAME
k5login \- Kerberos V5 acl file for host access
.
Expand Down Expand Up @@ -28,8 +30,6 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
.\" Man page generated from reStructuredText.
.
.SH DESCRIPTION
.sp
The .k5login file, which resides in a user\(aqs home directory, contains
Expand All @@ -41,7 +41,7 @@ administrators remote root access to the host via Kerberos.
.SH EXAMPLES
.sp
Suppose the user \fBalice\fP had a .k5login file in her home directory
containing the following line:
containing just the following line:
.INDENT 0.0
.INDENT 3.5
.sp
Expand All @@ -55,7 +55,12 @@ bob@FOOBAR.ORG
.sp
This would allow \fBbob\fP to use Kerberos network applications, such as
ssh(1), to access \fBalice\fP\(aqs account, using \fBbob\fP\(aqs Kerberos
tickets.
tickets. In a default configuration (with \fBk5login_authoritative\fP set
to true in \fIkrb5.conf(5)\fP), this .k5login file would not let
\fBalice\fP use those network applications to access her account, since
she is not listed! With no .k5login file, or with \fBk5login_authoritative\fP
set to false, a default rule would permit the principal \fBalice\fP in the
machine\(aqs default realm to access the \fBalice\fP account.
.sp
Let us further suppose that \fBalice\fP is a system administrator.
Alice and the other system administrators would have their principals
Expand Down Expand Up @@ -86,6 +91,6 @@ kerberos(1)
.SH AUTHOR
MIT
.SH COPYRIGHT
1985-2013, MIT
1985-2014, MIT
.\" Generated by docutils manpage writer.
.
8 changes: 4 additions & 4 deletions src/man/k5srvutil.man
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
.TH "K5SRVUTIL" "1" " " "1.12.1" "MIT Kerberos"
.\" Man page generated from reStructuredText.
.
.TH "K5SRVUTIL" "1" " " "1.12.2" "MIT Kerberos"
.SH NAME
k5srvutil \- host key table (keytab) manipulation utility
.
Expand Down Expand Up @@ -28,8 +30,6 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
.\" Man page generated from reStructuredText.
.
.SH SYNOPSIS
.sp
\fBk5srvutil\fP \fIoperation\fP
Expand Down Expand Up @@ -84,6 +84,6 @@ place.
.SH AUTHOR
MIT
.SH COPYRIGHT
1985-2013, MIT
1985-2014, MIT
.\" Generated by docutils manpage writer.
.
32 changes: 20 additions & 12 deletions src/man/kadm5.acl.man
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
.TH "KADM5.ACL" "5" " " "1.12.1" "MIT Kerberos"
.\" Man page generated from reStructuredText.
.
.TH "KADM5.ACL" "5" " " "1.12.2" "MIT Kerberos"
.SH NAME
kadm5.acl \- Kerberos ACL file
.
Expand Down Expand Up @@ -28,8 +30,6 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
.\" Man page generated from reStructuredText.
.
.SH DESCRIPTION
.sp
The Kerberos \fIkadmind(8)\fP daemon uses an Access Control List
Expand All @@ -39,7 +39,7 @@ which principals can operate on which other principals.
.sp
The default location of the Kerberos ACL file is
\fB@LOCALSTATEDIR@\fP\fB/krb5kdc\fP\fB/kadm5.acl\fP unless this is overridden by the \fIacl_file\fP
variable in \fIkdc.conf(5)\fP.
variable in \fIkdc.conf(5)\fP\&.
.SH SYNTAX
.sp
Empty lines and lines starting with the sharp sign (\fB#\fP) are
Expand All @@ -54,10 +54,14 @@ principal permissions [target_principal [restrictions] ]
.fi
.UNINDENT
.UNINDENT
.IP Note
.sp
\fBNOTE:\fP
.INDENT 0.0
.INDENT 3.5
Line order in the ACL file is important. The first matching entry
will control access for an actor principal on a target principal.
.RE
.UNINDENT
.UNINDENT
.INDENT 0.0
.TP
.B \fIprincipal\fP
Expand Down Expand Up @@ -148,7 +152,7 @@ character.
.sp
\fItarget_principal\fP can also include back\-references to \fIprincipal\fP,
in which \fB*number\fP matches the corresponding wildcard in
\fIprincipal\fP.
\fIprincipal\fP\&.
.TP
.B \fIrestrictions\fP
(Optional) A string of flags. Allowed restrictions are:
Expand All @@ -165,7 +169,7 @@ are the same as the + and \- flags for the kadmin
policy is forced to be empty.
.TP
.B \fI\-policy pol\fP
policy is forced to be \fIpol\fP.
policy is forced to be \fIpol\fP\&.
.TP
.B \-{\fIexpire, pwexpire, maxlife, maxrenewlife\fP} \fItime\fP
(\fIgetdate\fP string) associated value will be forced to
Expand All @@ -177,13 +181,17 @@ MIN(\fItime\fP, requested value).
The above flags act as restrictions on any add or modify operation
which is allowed due to that ACL line.
.UNINDENT
.IP Warning
.sp
\fBWARNING:\fP
.INDENT 0.0
.INDENT 3.5
If the kadmind ACL file is modified, the kadmind daemon needs to be
restarted for changes to take effect.
.RE
.UNINDENT
.UNINDENT
.SH EXAMPLE
.sp
Here is an example of a kadm5.acl file.
Here is an example of a kadm5.acl file:
.INDENT 0.0
.INDENT 3.5
.sp
Expand Down Expand Up @@ -230,6 +238,6 @@ longer than 9 hours.
.SH AUTHOR
MIT
.SH COPYRIGHT
1985-2013, MIT
1985-2014, MIT
.\" Generated by docutils manpage writer.
.

0 comments on commit 64fca79

Please sign in to comment.