summaryrefslogtreecommitdiffstats
path: root/krb5.spec
diff options
context:
space:
mode:
authorRoland Mainz <rmainz@redhat.com>2015-05-06 01:15:00 +0200
committerRoland Mainz <rmainz@redhat.com>2015-05-06 01:15:00 +0200
commit1171aa60d067146c4242263474bb24fe58b33211 (patch)
tree4e223dd2e610356d08336d0f8358d85112ca5f65 /krb5.spec
parent14a63ce3734babae7b11df97671e2ded3f7456d0 (diff)
downloadkrb5-1171aa60d067146c4242263474bb24fe58b33211.tar.gz
krb5-1171aa60d067146c4242263474bb24fe58b33211.tar.xz
krb5-1171aa60d067146c4242263474bb24fe58b33211.zip
* Mon May 4 2015 Roland Mainz <rmainz@redhat.com> - 1.13.1-4
- fix for CVE-2015-2694 (#1216133) "requires_preauth bypass in PKINIT-enabled KDC". In MIT krb5 1.12 and later, when the KDC is configured with PKINIT support, an unauthenticated remote attacker can bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password. resolves: #1216134
Diffstat (limited to 'krb5.spec')
-rw-r--r--krb5.spec14
1 files changed, 13 insertions, 1 deletions
diff --git a/krb5.spec b/krb5.spec
index 17da7f8..cde6f6c 100644
--- a/krb5.spec
+++ b/krb5.spec
@@ -43,7 +43,7 @@
Summary: The Kerberos network authentication system
Name: krb5
Version: 1.13.1
-Release: 3%{?dist}
+Release: 4%{?dist}
# - Maybe we should explode from the now-available-to-everybody tarball instead?
# http://web.mit.edu/kerberos/dist/krb5/1.13/krb5-1.13.1-signed.tar
# - The sources below are stored in a lookaside cache. Upload with
@@ -96,6 +96,7 @@ Patch134: krb5-1.11-kpasswdtest.patch
Patch136: krb5-socket_wrapper_eventfd_prototype_mismatch.patch
Patch140: krb5-1.14-Support-KDC_ERR_MORE_PREAUTH_DATA_REQUIRED.patch
Patch141: krb5-1.12.1-CVE_2014_5355_fix_krb5_read_message_handling.patch
+Patch142: krb5-1.13.2-CVE_2015_2694_requires_preauth_bypass_in_PKINIT_enabled_KDC.patch
License: MIT
URL: http://web.mit.edu/kerberos/www/
@@ -319,6 +320,7 @@ ln NOTICE LICENSE
%patch140 -p1 -b .krb5-1.14-support-kdc_err_more_preauth_data_required
%patch141 -p1 -b .krb5-1.12.1-cve_2014_5355_fix_krb5_read_message_handling
+%patch142 -p1 -b .krb5-1.13.2-cve_2015_2694_requires_preauth_bypass_in_pkinit_enabled_kdc
# Take the execute bit off of documentation.
chmod -x doc/krb5-protocol/*.txt doc/ccapi/*.html
@@ -1002,6 +1004,16 @@ exit 0
%changelog
+* Mon May 4 2015 Roland Mainz <rmainz@redhat.com> - 1.13.1-4
+- fix for CVE-2015-2694 (#1216133) "requires_preauth bypass
+ in PKINIT-enabled KDC".
+ In MIT krb5 1.12 and later, when the KDC is configured with
+ PKINIT support, an unauthenticated remote attacker can
+ bypass the requires_preauth flag on a client principal and
+ obtain a ciphertext encrypted in the principal's long-term
+ key. This ciphertext could be used to conduct an off-line
+ dictionary attack against the user's password.
+
* Wed Mar 25 2015 Roland Mainz <rmainz@redhat.com> - 1.13.1-3
- Add temporay workaround for RH bug #1204646 ("krb5-config
returns wrong -specs path") which modifies krb5-config post