524 problems with 1.3.4, and historical issues

Daniel Henninger daniel at unity.ncsu.edu
Thu Jul 15 13:57:00 EDT 2004


Is there a patch to the 1.2.8 series to avoid:
Buffer overflow in krb5_aname_to_localname functionality. See advisories 
index or  advisory text.

Or is 1.2.8 not susceptable?

I hadn't seen any patches for pre-1.3.0.  Are y'all officially considering 
1.2.* "old as a brick" and time to upgrade?

Daniel

-- 
/\\\----------------------------------------------------------------------///\
\ \\\      Daniel Henninger           http://www.vorpalcloud.org/        /// /
  \_\\\      North Carolina State University - Systems Programmer        ///_/
     \\\                   Information Technology <IT>                  ///
      """--------------------------------------------------------------"""


More information about the Kerberos mailing list