lp:ubuntu/dapper/krb5

Created by James Westby and last modified
Get this branch:
bzr branch lp:ubuntu/dapper/krb5
Members of Ubuntu branches can upload to this branch. Log in for directions.

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Review team:
Ubuntu Development Team
Status:
Mature

Recent revisions

6. By Sam Hartman

* Configure with --enable-shared --enable-static so that libkrb5-dev
  gets static libraries.
* Fix double free in getting credentials, Closes: #344543

5. By Sam Hartman

Fix problem when libpthreads is dynamically loaded into a program
causing mutexes to sometimes be used and sometimes not be used. If
the library starts out without threads support it will never start
using threads support; doing anything else causes hangs.

4. By Sam Hartman

* Fix a mistake in variable names that caused the package to be built
  without optimization.
* Allow whitespace before comments in krb5.conf. Thanks, Jeremie
  Koenig. (Closes: #314609)
* GCC 4.0 compile fixes, thanks Daniel Schepler. (Closes: #315618)
* Avoid "say yes" in debconf templates. (Closes: #306883)
* Update Czech translation, thanks Miroslav Kure.
* Update French translation, thanks Christian Perrier. (Closes: #307748)
* Update Portuguese (Brazil) translation, thanks André Luís Lopes.
* New Vietnamese translation, thanks Clytie Siddall. (Closes: #312172)
* Update standards version to 3.6.2 (no changes required).
* DAK can now handle not repeating maintainers in uploaders.
* Fix double free in krb5_recvauth; critical because it is in the code
  path for kpropd and may allow arbitrary code
  execution. (can-2005-1689)
* For the record, most of the changes in this version were made by Russ,
  but I'm doing the upload because of the security fix.
* krb5_unparse_name overflows allocated storage by one byte on 0 element
  principal name (CAN-2005-1175, VU#885830)
* Do not free unallocated storage in the KDC's TCP request handling
  path (CAN-2005-1174, VU#259798)

3. By Sam Hartman

* New upstream version
* Changing a password afwter the size of password history has been
    reduced may double free or write past end of an arry; fix
        (CAN-2004-1189/ CERT VU#948033)
     * Conflict between krb5-kdc and kerberos4kth-kdc; also deals with
  krb5-admin-server conflict indirectly, Closes: #274763

2. By Sam Hartman

* Initial Czech translations thanks to Miroslav Kure, Closes: #264366
* Updated French debconf translation, thanks Martin Quinson, Closes: #264941
* KDC and clients double-free on error conditions (CAN-2004-0642 VU#795632)
*krb5_rd_cred() double-frees on error conditions(CAN-2004-0643 , CERT
  VU#866472 )
* ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
  earlier allows unauthenticated remote attackers to induce
  infinite loop, causing denial of service, including in KDC
  code (CAN-2004-0644 , CERT VU#550464)
* Fix double free in krb524d handling of encrypted ticket contents
  (CAN-2004-0772)

1. By Sam Hartman

Import upstream version 1.3.4

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp:ubuntu/lucid/krb5
This branch contains Public information 
Everyone can see this information.

Subscribers