Name: | krb5-devel |
---|---|
Version: | 1.21.1 |
Release: | 1.0.1.el9 |
Architecture: | i686 |
Group: | Unspecified |
Size: | 723548 |
License: | MIT |
RPM: | krb5-devel-1.21.1-1.0.1.el9.i686.rpm |
Source RPM: | krb5-1.21.1-1.0.1.el9.src.rpm |
Build Date: | Mon Oct 23 2023 |
Build Host: | build-ol9-i386.oracle.com |
Vendor: | Oracle America |
URL: | https://web.mit.edu/kerberos/www/ |
Summary: | Development files needed to compile Kerberos 5 programs |
Description: | Kerberos is a network authentication system. The krb5-devel package contains the header files and libraries needed for compiling Kerberos 5 programs. If you want to develop Kerberos-aware programs, you need to install this package. |
- Fixed race condition in krb5_set_password() [Orabug: 33609767]
- New upstream version (1.21.1) - Fix double-free in KDC TGS processing (CVE-2023-39975) - Add support for "pac_privsvr_enctype" KDB string attribute Resolves: rhbz#2060421
- Do not disable PKINIT if some of the well-known DH groups are unavailable Resolves: rhbz#2187722 - Make PKINIT CMS SHA-1 signature verification available in FIPS mode Resolves: rhbz#2155607 - Allow to set PAC ticket signature as optional Resolves: rhbz#2178298
- Fix datetime parsing in kadmin on s390x Resolves: rhbz#2169985
- Fix double free on kdb5_util key creation failure Resolves: rhbz#2166603
- Add support for MS-PAC extended KDC signature (CVE-2022-37967) Resolves: rhbz#2165827
- Bypass FIPS restrictions to use KRB5KDF in case AES SHA-1 HMAC is enabled - Lazily load MD4/5 from OpenSSL if using RADIUS or RC4 enctype in FIPS mode Resolves: rhbz#2162461
- Set aes256-cts-hmac-sha384-192 as EXAMLE.COM master key in kdc.conf - Add AES SHA-2 HMAC family as EXAMPLE.COM supported etypes in kdc.conf Resolves: rhbz#2068535
- Strip debugging data from ksu executable file Resolves: rhbz#2159643
- Make tests compatible with sssd-client Resolves: rhbz#2151513 - Remove invalid password expiry warning Resolves: rhbz#2121099 - Update error checking for OpenSSL CMS_verify Resolves: rhbz#2063838 - New upstream version (1.20.1) Resolves: rhbz#2016312 - Fix integer overflows in PAC parsing (CVE-2022-42898) Resolves: rhbz#2140971