Branches for Warty

Name Status Last Modified Last Commit
lp:ubuntu/warty/krb5 1 Development 2009-12-09 16:03:19 UTC
2. * Initial Czech translations thanks t...

Author: Sam Hartman
Revision Date: 2004-08-31 13:04:51 UTC

* Initial Czech translations thanks to Miroslav Kure, Closes: #264366
* Updated French debconf translation, thanks Martin Quinson, Closes: #264941
* KDC and clients double-free on error conditions (CAN-2004-0642 VU#795632)
*krb5_rd_cred() double-frees on error conditions(CAN-2004-0643 , CERT
  VU#866472 )
* ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
  earlier allows unauthenticated remote attackers to induce
  infinite loop, causing denial of service, including in KDC
  code (CAN-2004-0644 , CERT VU#550464)
* Fix double free in krb524d handling of encrypted ticket contents
  (CAN-2004-0772)

lp:ubuntu/warty-security/krb5 1 Development 2009-12-09 16:03:37 UTC
3. * SECURITY UPDATE: Multiple buffer ov...

Author: Martin Pitt
Revision Date: 2005-12-05 16:06:37 UTC

* SECURITY UPDATE: Multiple buffer overflows.
* Fix buffer overflow in env_opt_add() in telnet clients. [CVE-2005-0468]
* Fix buffer overflow in in the handling of the LINEMODE suboptions in
  telnet clients. [CVE-2005-0469]
* Fix double free in krb5_recvauth(). [CVE-2005-1689]
* krb5_unparse_name overflows allocated storage by one byte on 0 element
  principal name. [CVE-2005-1175, VU#885830]
* Do not free unallocated storage in the KDC's TCP request handling
  path. [CVE-2005-1174, VU#259798]

12 of 2 results