krb5-1.2.6 is released

Tom Yu tlyu at MIT.EDU
Thu Sep 12 17:19:14 EDT 2002


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.2.6.  This release is a patch release; some non-critical
bugs and feature requests have not been incorporated.  Please see
below for a list of some changes since release 1.2.5, or consult the
README file in the source tree for a more detailed list of significant
changes.

RETRIEVING KERBEROS 5 RELEASE 1.2.6
===================================
You may retrieve the Kerberos 5 Release 1.2.6 source from the
following URL:


	http://web.mit.edu/network/kerberos-form.html

Further information about Kerberos 5 may be found at the following
URL:

	http://web.mit.edu/kerberos/www/index.html

MAJOR CHANGES SINCE RELEASE 1.2.5
=================================

* The security vulnerability in xdr_array() [MITKRB5-SA-2002-001] has
  been patched.  Thanks to Jeffrey Hutzelman and Nikolai Zeldovich.

* A NULL pointer dereference in kadmind has been fixed
  [krb5-admin/1140].  Thanks to Mark Levinson.

* There was a botched buffer overflow patch in kadmind4 that caused
  problems with kadmind4 acl handling.  It has been fixed.  Thanks to
  Mark Silis.

* Correct ETYPE_INFO padata are now generated.  Thanks to Lubos
  Kejzlar.

* A bug in AFS salt handling has been worked
  around. [krb5-clients/1146] Thanks to Wolfgang Friebel.

* Various fixes have been made to the principal database code to
  prevent some types of database corruption, and rudimentary repair
  facilities for certain types of corruption now exist.

=========================
Tom Yu
MIT Information Systems
Kerberos Development Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (SunOS)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard <http://www.gnupg.org/>

iD8DBQE9gQTWSO8fWy4vZo4RAiq9AKC1//Lz+xqqEYUzYbjqklvU5oJNAQCfU590
blCuBpTSbrcS+HFw3uCQ5MM=
=09f7
-----END PGP SIGNATURE-----



More information about the kerberos-announce mailing list