524 problems with 1.3.4, and historical issues
Daniel Henninger
daniel at unity.ncsu.edu
Thu Jul 15 13:57:00 EDT 2004
Is there a patch to the 1.2.8 series to avoid:
Buffer overflow in krb5_aname_to_localname functionality. See advisories
index or advisory text.
Or is 1.2.8 not susceptable?
I hadn't seen any patches for pre-1.3.0. Are y'all officially considering
1.2.* "old as a brick" and time to upgrade?
Daniel
--
/\\\----------------------------------------------------------------------///\
\ \\\ Daniel Henninger http://www.vorpalcloud.org/ /// /
\_\\\ North Carolina State University - Systems Programmer ///_/
\\\ Information Technology <IT> ///
"""--------------------------------------------------------------"""
More information about the Kerberos
mailing list