krb5-1.2.7 is released

Tom Yu tlyu at MIT.EDU
Fri Nov 15 16:43:00 EST 2002


-----BEGIN PGP SIGNED MESSAGE-----

The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.2.7.  This release is a patch release; some non-critical
bugs and feature requests have not been incorporated.  Please see
below for a list of some changes since release 1.2.6, or consult the
README file in the source tree for a more detailed list of significant
changes.

RETRIEVING KERBEROS 5 RELEASE 1.2.7
===================================
You may retrieve the Kerberos 5 Release 1.2.7 source from the
following URL:


	http://web.mit.edu/network/kerberos-form.html

Further information about Kerberos 5 may be found at the following
URL:

	http://web.mit.edu/kerberos/www/index.html

MAJOR CHANGES SINCE RELEASE 1.2.6
=================================

* [1238] The exploitable buffer overflow in kadmind4
  [MITKRB5-SA-2002-002] has been patched.  Thanks to Johan Danielsson,
  Love Hornquist-Astrand, and Assar Westerlund.

* [1230, 1236] Hierarchical cross-realm has been repaired somewhat.
  Terminating NUL characters are no longer generated, and are ignored
  on receipt.

=========================
Tom Yu
MIT Information Systems
Kerberos Development Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (SunOS)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard <http://www.gnupg.org/>

iQCVAwUBPdVpQabDgE/zdoE9AQFnYAQAx3JajKLkuOzwo1Bccahk1q+KXH9RBAXz
11uC+K9eFwCh8s4tGthykWym6lYWfCrDvRbYsv/+E0tW3E64fBqwvvbi2AanT42c
+nww4HbDhVvzoP1L8/TSPoUXoU4Tf25pejQ9hRzsNTQqh6Npnitt+AuIpqx30HX2
TJr2NAFam9Y=
=d1B4
-----END PGP SIGNATURE-----



More information about the kerberos-announce mailing list