This bug was fixed in the package krb5 - 1.7dfsg~beta3-1ubuntu0.4 --------------- krb5 (1.7dfsg~beta3-1ubuntu0.4) karmic-proposed; urgency=low
* Cherry-pick various fixes from Debian: - libkrb5-dev depends on libkrb5client6 (LP: #472080) - Avoid locking out accounts on PREAUTH_FAILED, Closes: #557979 (LP: #489418) - 6506: correctly handle keytab vs stash file - 6508: kadmind ACL parsing could reference uninitialized memory - 6509: kadmind can reference null pointer on ACL error - 6511: uninitialized memory passed to krb5_free_error in change password client path - 6514: none replay cache memory leak - 6515: profile library mutex performance improvements - 6541: memory leak in PAC verify code - 6542: Check for null characters in pkinit certs - 6543: login vs user order in ftpd sometimes wrong - 6551: Memory leak in spnego accept_sec_context error path -- Evan Broder <bro...@mit.edu> Thu, 07 Jan 2010 21:28:45 -0500 ** Changed in: krb5 (Ubuntu Karmic) Status: Fix Committed => Fix Released -- Installs symlinks to files in non-dependency libkadm5clnt6 https://bugs.launchpad.net/bugs/472080 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs