krb5-multidev_1.13.2+dfsg-5_amd64.deb


Advertisement

Description

krb5-multidev - Development files for MIT Kerberos without Heimdal conflict

Property Value
Distribution Ubuntu 16.04 LTS (Xenial Xerus)
Repository Ubuntu Main amd64
Package filename krb5-multidev_1.13.2+dfsg-5_amd64.deb
Package name krb5-multidev
Package version 1.13.2+dfsg
Package release 5
Package architecture amd64
Package type deb
Category libdevel
Homepage http://web.mit.edu/kerberos/
License -
Maintainer Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
Download size 110.83 KB
Installed size 785.00 KB
Kerberos is a system for authenticating users and services on a network.
Kerberos is a trusted third-party service.  That means that there is a
third party (the Kerberos server) that is trusted by all the entities on
the network (users and services, usually called "principals").
This is the MIT reference implementation of Kerberos V5.
Most users wishing to build applications against MIT Kerberos should
install libkrb5-dev.  However, that package conflicts with heimdal-dev.
This package installs libraries and headers in /usr/include/mit-krb5 and
/usr/lib/mit-krb5 and can be installed along side heimdal-multidev, which
provides the same facilities for Heimdal.

Alternatives

Package Version Architecture Repository
krb5-multidev_1.13.2+dfsg-5ubuntu2.1_amd64.deb 1.13.2+dfsg amd64 Ubuntu Updates Main
krb5-multidev_1.13.2+dfsg-5ubuntu2.1_i386.deb 1.13.2+dfsg i386 Ubuntu Updates Main
krb5-multidev_1.13.2+dfsg-5_i386.deb 1.13.2+dfsg i386 Ubuntu Main
krb5-multidev - - -

Requires

Name Value
comerr-dev -
libgssapi-krb5-2 = 1.13.2+dfsg-5
libgssrpc4 = 1.13.2+dfsg-5
libk5crypto3 = 1.13.2+dfsg-5
libkadm5clnt-mit9 = 1.13.2+dfsg-5
libkadm5srv-mit9 = 1.13.2+dfsg-5
libkrb5-3 = 1.13.2+dfsg-5

Download

Type URL
Mirror archive.ubuntu.com
Binary Package krb5-multidev_1.13.2+dfsg-5_amd64.deb
Source Package krb5

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install krb5-multidev deb package:
    # sudo apt-get install krb5-multidev

Files

Path
/usr/bin/krb5-config.mit
/usr/include/mit-krb5/gssapi.h
/usr/include/mit-krb5/kdb.h
/usr/include/mit-krb5/krb5.h
/usr/include/mit-krb5/profile.h
/usr/include/mit-krb5/gssapi/gssapi.h
/usr/include/mit-krb5/gssapi/gssapi_ext.h
/usr/include/mit-krb5/gssapi/gssapi_generic.h
/usr/include/mit-krb5/gssapi/gssapi_krb5.h
/usr/include/mit-krb5/gssapi/mechglue.h
/usr/include/mit-krb5/gssrpc/auth.h
/usr/include/mit-krb5/gssrpc/auth_gss.h
/usr/include/mit-krb5/gssrpc/auth_gssapi.h
/usr/include/mit-krb5/gssrpc/auth_unix.h
/usr/include/mit-krb5/gssrpc/clnt.h
/usr/include/mit-krb5/gssrpc/netdb.h
/usr/include/mit-krb5/gssrpc/pmap_clnt.h
/usr/include/mit-krb5/gssrpc/pmap_prot.h
/usr/include/mit-krb5/gssrpc/pmap_rmt.h
/usr/include/mit-krb5/gssrpc/rename.h
/usr/include/mit-krb5/gssrpc/rpc.h
/usr/include/mit-krb5/gssrpc/rpc_msg.h
/usr/include/mit-krb5/gssrpc/svc.h
/usr/include/mit-krb5/gssrpc/svc_auth.h
/usr/include/mit-krb5/gssrpc/types.h
/usr/include/mit-krb5/gssrpc/xdr.h
/usr/include/mit-krb5/kadm5/admin.h
/usr/include/mit-krb5/kadm5/chpass_util_strings.h
/usr/include/mit-krb5/kadm5/kadm_err.h
/usr/include/mit-krb5/krb5/ccselect_plugin.h
/usr/include/mit-krb5/krb5/clpreauth_plugin.h
/usr/include/mit-krb5/krb5/hostrealm_plugin.h
/usr/include/mit-krb5/krb5/kadm5_hook_plugin.h
/usr/include/mit-krb5/krb5/kdcpreauth_plugin.h
/usr/include/mit-krb5/krb5/krb5.h
/usr/include/mit-krb5/krb5/localauth_plugin.h
/usr/include/mit-krb5/krb5/locate_plugin.h
/usr/include/mit-krb5/krb5/plugin.h
/usr/include/mit-krb5/krb5/preauth_plugin.h
/usr/include/mit-krb5/krb5/pwqual_plugin.h
/usr/lib/x86_64-linux-gnu/mit-krb5/libgssapi_krb5.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libgssrpc.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libk5crypto.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkadm5clnt.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkadm5clnt_mit.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkadm5srv.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkadm5srv_mit.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkdb5.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkrb5.so
/usr/lib/x86_64-linux-gnu/mit-krb5/libkrb5support.so
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5-gssapi.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/gssrpc.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/kadm-client.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/kadm-server.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/kdb.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/krb5-gssapi.pc
/usr/lib/x86_64-linux-gnu/pkgconfig/mit-krb5/krb5.pc
/usr/share/doc/krb5-multidev/NEWS.Debian.gz
/usr/share/doc/krb5-multidev/changelog.Debian.gz
/usr/share/doc/krb5-multidev/copyright
/usr/share/man/man1/krb5-config.mit.1.gz

Changelog

2016-02-23 - Sam Hartman <hartmans@debian.org>
krb5 (1.13.2+dfsg-5) unstable; urgency=high
*  Security Update
* Verify decoded kadmin C strings [CVE-2015-8629]
CVE-2015-8629: An authenticated attacker can cause kadmind to read
beyond the end of allocated memory by sending a string without a
terminating zero byte. Information leakage may be possible for an
attacker with permission to modify the database. (Closes: #813296)
* Check for null kadm5 policy name [CVE-2015-8630]
CVE-2015-8630: An authenticated attacker with permission to modify a
principal entry can cause kadmind to dereference a null pointer by
supplying a null policy value but including KADM5_POLICY in the mask.
(Closes: #813127)
* Fix leaks in kadmin server stubs [CVE-2015-8631]
CVE-2015-8631: An authenticated attacker can cause kadmind to leak
memory by supplying a null principal name in a request which uses one.
Repeating these requests will eventually cause kadmind to exhaust all
available memory. (Closes: #813126)
2015-11-04 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.13.2+dfsg-4) unstable; urgency=high
* Import upstream patches fixing regressions in the previous upload:
- CVE-2015-2698: the patch for CVE-2015-2696 caused memory corruption
for applications calling gss_export_sec_context() on contexts
established using the IAKERB mechanism.
- Supply gss_import_sec_context implementations for SPNEGO and IAKERB,
which were not implemented due to the erroneous belief that the
exported context tokens would be tagged with the underlying
context's mechanism.
2015-10-26 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.13.2+dfsg-3) unstable; urgency=high
* Import upstream patches for three CVEs:
- CVE-2015-2695: SPNEGO context aliasing during establishment
- CVE-2015-2696: IAKERB context aliasing during establishment
- CVE-2015-2697: unsafe string handling in TGS processing
2015-06-25 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.13.2+dfsg-2) unstable; urgency=medium
* No-change rebuild to target unstable
2015-05-14 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.13.2+dfsg-1) experimental; urgency=medium
* New upstream release:
- Fix importing GSS composite export names
- Fix kadm5.acl wildcard matching when early lines have partial matches
- Disable principal renames for LDAP; they do not work properly and are
hard to fix
- Fix LDAP ticket policies on big-endian LP64 systems
- Fix memory leak in DB2 iteration
- Prevent requires_preauth bypass (CVE-2015-2694), Closes: #783557
* Add python to build-depends-indep, since we call it manually during
the documentation build, Closes: #746395
2015-03-16 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.13.1+dfsg-1) experimental; urgency=low
* New upstream release:
- Make the KDC default to listening on TCP (as well as UDP)
- Bump DAL major version for krb5_db_iterate() API change; KDB modules
will need to be rebuilt
- Let ksu use any keytab entry to verify the obtained TGT
- Improve kadm5_randkey_principal interop with Solaris KDCs
- Export symbols for some public gss interfaces
- Allow the logger to work with redirected stderr
- Remove length limit on PKINIT PKCS#12 prompts
2015-05-13 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.12.1+dfsg-20) unstable; urgency=high
* Import upstream patch for CVE-2015-2694, Closes: #783557
* Bump Standards-Version to 3.9.6 (no changes needed)
2015-03-20 - Sam Hartman <hartmans@debian.org>
krb5 (1.12.1+dfsg-19) unstable; urgency=medium
* mark systemd unit directories as optional, Closes: #780831
2015-02-18 - Benjamin Kaduk <kaduk@mit.edu>
krb5 (1.12.1+dfsg-18) unstable; urgency=high
* Import upstream patch for CVE-2014-5355, Closes: #778647

See Also

Package Description
landscape-client_16.03-0ubuntu2_amd64.deb The Landscape administration system client
landscape-common_16.03-0ubuntu2_amd64.deb The Landscape administration system client - Common files
language-pack-af-base_16.04+20160415_all.deb translations for language Afrikaans
language-pack-af_16.04+20160415_all.deb translation updates for language Afrikaans
language-pack-am-base_16.04+20160415_all.deb translations for language Amharic
language-pack-am_16.04+20160415_all.deb translation updates for language Amharic
language-pack-an-base_16.04+20160415_all.deb translations for language Aragonese
language-pack-an_16.04+20160415_all.deb translation updates for language Aragonese
language-pack-ar-base_16.04+20160415_all.deb translations for language Arabic
language-pack-ar_16.04+20160415_all.deb translation updates for language Arabic
language-pack-as-base_16.04+20160415_all.deb translations for language Assamese
language-pack-as_16.04+20160415_all.deb translation updates for language Assamese
language-pack-ast-base_16.04+20160415_all.deb translations for language Asturian
language-pack-ast_16.04+20160415_all.deb translation updates for language Asturian
language-pack-az-base_16.04+20160415_all.deb translations for language Azerbaijani
Advertisement
Advertisement