0ad6437d0b
- Prevent overflow when calculating ulog block size. An authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash; (CVE-2025-24528); (bsc#1236619). - Add patch 0010-CVE-2025-24528.patch
Dirk Mueller2025-02-05 16:20:16 +00:00
3ee57d14de
Accepting request 1185764 from network
Ana Guerrero2024-07-08 17:06:50 +00:00
193f91051e
- Update to 1.21.3 * Fix vulnerabilities in GSS message token handling: * CVE-2024-37370, bsc#1227186 * CVE-2024-37371, bsc#1227187 * Fix a potential bad pointer free in krb5_cccol_have_contents() * Fix a memory leak in the macOS ccache type - Update patch 0009-Fix-three-memory-leaks.patch
Dirk Mueller2024-07-04 07:20:48 +00:00
09c6d1fd49
Accepting request 1175448 from network
Ana Guerrero2024-05-21 16:34:17 +00:00
5d6e2bca14
Accepting request 1174873 from home:scabrero:branches:network
Samuel Cabrero2024-05-21 07:32:21 +00:00
b85624a3ad
Accepting request 1173900 from network
Ana Guerrero2024-05-15 19:25:47 +00:00
0f79103832
Accepting request 1173687 from home:gladiac:branches:network
Samuel Cabrero2024-05-14 07:54:34 +00:00
ec33d02bf2
Accepting request 1171363 from network
Ana Guerrero2024-05-02 21:46:50 +00:00
6402def7df
Accepting request 1171347 from home:kukuk:cleanup
Samuel Cabrero2024-05-02 13:10:43 +00:00
fd2ab2030e
Accepting request 1169845 from home:scabrero:branches:network
Dirk Mueller2024-05-01 05:54:37 +00:00
06437f46c4
Accepting request 1156860 from network
Ana Guerrero2024-04-04 20:24:00 +00:00
39ade0e594
Accepting request 1153219 from home:pmonrealgonzalez:branches:network
Samuel Cabrero2024-03-11 07:49:33 +00:00
0303b6cb4c
Accepting request 1134351 from network
Ana Guerrero2023-12-21 22:37:52 +00:00
12dcc60b0b
- update to 1.21.2 (bsc#1218211, CVE-2023-39975): * Fix double-free in KDC TGS processing [CVE-2023-39975]. - update to 1.21.1 (CVE-2023-36054): with Windows KDCs.
Dirk Mueller2023-12-20 23:21:24 +00:00
0f8352fed9
Accepting request 1114991 from network
Ana Guerrero2023-10-05 18:02:35 +00:00
157057f8f8
Accepting request 1114983 from home:dimstar:Factory
Samuel Cabrero2023-10-03 12:17:40 +00:00
01a27b5e5c
Accepting request 1098841 from network
Ana Guerrero2023-07-17 17:22:54 +00:00
36feefeaf6
- update to 1.121.1 (CVE-2023-36054): * Fix potential uninitialized pointer free in kadm5 XDR parsing [CVE-2023-36054]. * Added a credential cache type providing compatibility with the macOS 11 native credential cache. * libkadm5 will use the provided krb5_context object to read configuration values, instead of creating its own. * Added an interface to retrieve the ticket session key from a GSS context. * The KDC will no longer issue tickets with RC4 or triple-DES session keys unless explicitly configured with the new allow_rc4 or allow_des3 variables respectively. * The KDC will assume that all services can handle aes256-sha1 session keys unless the service principal has a session_enctypes string attribute. * Support for PAC full KDC checksums has been added to mitigate an S4U2Proxy privilege escalation attack. * The PKINIT client will advertise a more modern set of supported CMS algorithms. * Removed unused code in libkrb5, libkrb5support, and the PKINIT module. * Modernized the KDC code for processing TGS requests, the code for encrypting and decrypting key data, the PAC handling code, and the GSS library packet parsing and composition code. * Improved the test framework's detection of memory errors in daemon processes when used with asan.
Dirk Mueller2023-07-15 18:25:31 +00:00