[16823] in Kerberos_V5_Development
krb5-1.7.2 is released
daemon@ATHENA.MIT.EDU (Tom Yu)
Tue May 24 19:36:35 2011
To: kerberos-announce@mit.edu
From: Tom Yu <tlyu@mit.edu>
Date: Tue, 24 May 2011 19:35:55 -0400
Message-ID: <ldvipszeko4.fsf@cathode-dark-space.mit.edu>
MIME-Version: 1.0
Reply-To: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.7.2. Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.7.2
===================================
You may retrieve the Kerberos 5 Release 1.7.2 source from the
following URL:
http://web.mit.edu/kerberos/dist/
The homepage for the krb5-1.7.2 release is:
http://web.mit.edu/kerberos/krb5-1.7/
Further information about Kerberos 5 may be found at the following
URL:
http://web.mit.edu/kerberos/
and at the MIT Kerberos Consortium web site:
http://www.kerberos.org/
DES transition
==============
The Data Encryption Standard (DES) is widely recognized as weak. The
krb5-1.7 release will contain measures to encourage sites to migrate
away from using single-DES cryptosystems. Among these is a
configuration variable that enables "weak" enctypes, but will default
to "false" in the future. Additional migration aids are planned for
future releases.
Major changes in 1.7.2
======================
This is primarily a bugfix release.
* Fix vulnerabilities:
** KDC denial of service [MITKRB5-SA-2010-001 CVE-2010-0283]
** SPNEGO denial of service [MITKRB5-SA-2010-002 CVE-2010-0628]
** KDC double free [MITKRB5-SA-2010-004 CVE-2010-1320]
** GSS-API null pointer dereference [MITKRB5-SA-2010-005 CVE-2010-1321]
** multiple checksum vulnerabilities [MITKRB5-SA-2010-007
CVE-2010-1324 CVE-2010-1323 CVE-2010-4021]
** kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
** KDC denial of service [MITKRB5-SA-2011-002 CVE-2011-0281 CVE-2011-0282]
** KDC double-free (PKINIT) [MITKRB5-SA-2011-003 CVE-2011-0284]
** kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]
* Fix the krb5-1.7 KDB master key migration support to handle pre-1.7
databases with master key kvno != 1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (SunOS)
iEYEARECAAYFAk3cQN4ACgkQSO8fWy4vZo7A9gCg3jjInKzdzCeDyyQ1x5NcHqir
n1sAn1WYe8Ey8RE635Q+rmrufYlqOsA0
=CSUc
-----END PGP SIGNATURE-----
_______________________________________________
kerberos-announce mailing list
kerberos-announce@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos-announce
_______________________________________________
krbdev mailing list krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev