Accepted krb5 1.6.dfsg.1-3 (source)
Ubuntu Installer
archive at ubuntu.com
Wed May 9 14:21:13 BST 2007
Accepted:
OK: krb5_1.6.dfsg.1.orig.tar.gz
OK: krb5_1.6.dfsg.1-3.diff.gz
OK: krb5_1.6.dfsg.1-3.dsc
-> Component: main Section: net
Origin: Debian/unstable
Format: 1.7
Date: Wed, 09 May 2007 14:18:37 +0100
Source: krb5
Binary: krb5-telnetd, krb5-clients, libkrb5-dev, krb5-ftpd, krb5-doc, krb5-user, libkrb5-dbg, libkadm55, libkrb53, krb5-kdc, krb5-rsh-server, krb5-admin-server
Architecture: source
Version: 1.6.dfsg.1-3
Distribution: gutsy
Urgency: critical
Maintainer: Sam Hartman <hartmans at debian.org>
Changed-By: Kees Cook <kees at ubuntu.com>
Closes: 393380 409318 409318 414382 420748 422687
Changes:
krb5 (1.6.dfsg.1-3) unstable; urgency=low
.
* Upstream bug #5552: krb5_get_init_creds needs to not dereference
gic_opts if it is null. Instead, assume that it is default options,
Closes: #422687
.
krb5 (1.6.dfsg.1-2) unstable; urgency=low
.
* Fix shlibdeps to reflect 1.6.dfsg.1 instead of 1.6.1
* Upload 1.6 to unstable
.
krb5 (1.6.dfsg.1-1) experimental; urgency=low
.
* Oops, I failed to understand how the version numbers work. Since 1.6.1 is less than 1.6.dfsg, the version numbering is going to be a bit screwy for the 1.6 series. We will use 1.6.dfsg.1 for 1.6.1.
* Update to update-inetd dependency, Closes: #420748
.
krb5 (1.6.1.dfsg-1) experimental; urgency=low
.
* Depend on keyutils-lib-dev so we consistently get keyring cache support
* New Portuguese translation, thanks Miguel Figueiredo , Closes: #409318
* New Upstream release
- Update shlibs for new API
* Fix handling of null realm in krb5_rd_req_decoded; now we treat a null realm as a default realm there.
.
krb5 (1.6.dfsg-1) experimental; urgency=low
.
* New 1.6 release from upstream.
* Update copyright
.
krb5 (1.6.dfsg~alpha1-1) experimental; urgency=low
.
* New upstream release
* Remove IETF RFCs, Closes: #393380
* Update copyright file based on new copyrights upstearm
.
krb5 (1.4.4-8) unstable; urgency=emergency
.
* MIT-SA-2007-1: telnet allows login as an arbitrary user when
presented with a specially crafted username; CVE-2007-0956
* krb5_klog_syslog has a trivial buffer overflow that can be exploited
by network data; CVE-2007-0957. The upstream patch is very intrusive
because it fixes each call to syslog to have proper length checking as
well as the actual krb5_klog_syslog internals to use vsnprintf rather
than vsprintf. I have chosen to only include the change to
krb5_klog_syslog for sarge. This is sufficient to fix the problem but
is much smaller and less intrusive. (MIT-SA-2007-2)
* MIT-SA-2007-3: The GSS-API library can cause a double free if
applications treat certain errors decoding a message as errors that
require freeing the output buffer. At least the gssapi rpc library
does this, so kadmind is vulnerable. Fix the gssapi library because
the spec allows applications to treat errors this way. CVE-2007-1216
* New Japanese translation, thanks TANAKA Atushi, Closes: #414382
.
krb5 (1.4.4-7) unstable; urgency=low
.
* Translation updates:
- New Portuguese translation, thanks Rui Branco. (Closes: #409318)
.
.
krb5 (1.4.4-6) unstable; urgency=emergency
.
* MIT-SA-2006-2: kadmind and rpc library call through function pointer
to freed memory (CVE-2006-6143). Null out xp_auth unless it is
associated with an rpcsec_gss connection.
Files:
8f8d6a494380f01a7a0a9236162afa52 14474321 net standard krb5_1.6.dfsg.1.orig.tar.gz
3149b3aa316cada5bf8665eaa8b9dcff 1654954 net standard krb5_1.6.dfsg.1-3.diff.gz
dd2cff628f829e79b77888285fc18ff0 898 net standard krb5_1.6.dfsg.1-3.dsc
More information about the gutsy-changes
mailing list