krb5-1.2.6 is released
Tom Yu
tlyu at MIT.EDU
Thu Sep 12 17:19:14 EDT 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.2.6. This release is a patch release; some non-critical
bugs and feature requests have not been incorporated. Please see
below for a list of some changes since release 1.2.5, or consult the
README file in the source tree for a more detailed list of significant
changes.
RETRIEVING KERBEROS 5 RELEASE 1.2.6
===================================
You may retrieve the Kerberos 5 Release 1.2.6 source from the
following URL:
http://web.mit.edu/network/kerberos-form.html
Further information about Kerberos 5 may be found at the following
URL:
http://web.mit.edu/kerberos/www/index.html
MAJOR CHANGES SINCE RELEASE 1.2.5
=================================
* The security vulnerability in xdr_array() [MITKRB5-SA-2002-001] has
been patched. Thanks to Jeffrey Hutzelman and Nikolai Zeldovich.
* A NULL pointer dereference in kadmind has been fixed
[krb5-admin/1140]. Thanks to Mark Levinson.
* There was a botched buffer overflow patch in kadmind4 that caused
problems with kadmind4 acl handling. It has been fixed. Thanks to
Mark Silis.
* Correct ETYPE_INFO padata are now generated. Thanks to Lubos
Kejzlar.
* A bug in AFS salt handling has been worked
around. [krb5-clients/1146] Thanks to Wolfgang Friebel.
* Various fixes have been made to the principal database code to
prevent some types of database corruption, and rudimentary repair
facilities for certain types of corruption now exist.
=========================
Tom Yu
MIT Information Systems
Kerberos Development Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (SunOS)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard <http://www.gnupg.org/>
iD8DBQE9gQTWSO8fWy4vZo4RAiq9AKC1//Lz+xqqEYUzYbjqklvU5oJNAQCfU590
blCuBpTSbrcS+HFw3uCQ5MM=
=09f7
-----END PGP SIGNATURE-----
More information about the kerberos-announce
mailing list