krb5-1.2.7 is released
Tom Yu
tlyu at MIT.EDU
Fri Nov 15 16:43:00 EST 2002
-----BEGIN PGP SIGNED MESSAGE-----
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.2.7. This release is a patch release; some non-critical
bugs and feature requests have not been incorporated. Please see
below for a list of some changes since release 1.2.6, or consult the
README file in the source tree for a more detailed list of significant
changes.
RETRIEVING KERBEROS 5 RELEASE 1.2.7
===================================
You may retrieve the Kerberos 5 Release 1.2.7 source from the
following URL:
http://web.mit.edu/network/kerberos-form.html
Further information about Kerberos 5 may be found at the following
URL:
http://web.mit.edu/kerberos/www/index.html
MAJOR CHANGES SINCE RELEASE 1.2.6
=================================
* [1238] The exploitable buffer overflow in kadmind4
[MITKRB5-SA-2002-002] has been patched. Thanks to Johan Danielsson,
Love Hornquist-Astrand, and Assar Westerlund.
* [1230, 1236] Hierarchical cross-realm has been repaired somewhat.
Terminating NUL characters are no longer generated, and are ignored
on receipt.
=========================
Tom Yu
MIT Information Systems
Kerberos Development Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (SunOS)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard <http://www.gnupg.org/>
iQCVAwUBPdVpQabDgE/zdoE9AQFnYAQAx3JajKLkuOzwo1Bccahk1q+KXH9RBAXz
11uC+K9eFwCh8s4tGthykWym6lYWfCrDvRbYsv/+E0tW3E64fBqwvvbi2AanT42c
+nww4HbDhVvzoP1L8/TSPoUXoU4Tf25pejQ9hRzsNTQqh6Npnitt+AuIpqx30HX2
TJr2NAFam9Y=
=d1B4
-----END PGP SIGNATURE-----
More information about the kerberos-announce
mailing list