As far as I can tell that was the only lintian error that represented
a real problem in the package.
--
Missing dependency on update-inetd and other issues
https://bugs.launchpad.net/bugs/374819
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
1.7dfsg~beta1-4 includes a fix to a serious interop problem with
heimdal-kdc from universe and no other changes. Sync it instead
** Summary changed:
- Sync krb5 1.7dfsg~beta1-3 (main) from Debian unstable (main).
+ Sync krb5 1.7dfsg~beta1-4 (main) from Debian unstable (main).
--
Sync krb5 1.7d
Hi. I'm the Debian maintainer of the krb5 package. I think that
merging either 1.6.dfsg.4~beta1-13 or doing a sync of unstable to
Ubuntu would be a reasonable course of action. The 1.7~beta1 packages
are not something I'd ship in a final release: I know of one upstream
patch expected to be in be
While it looks like 1.7 has very similar functionality to Likewise, the
implementation and exposed API seems unrelated. So, syncing krb5 1.7
will break Likewise until their code changes
--
Please merge krb5 1.7dfsg~beta1-3 (main) from Debian unstable (main)
https://bugs.launchpad.net/bugs/371765
krb5-kdc intentiollay does not require update-inted and will function if
update-inetd is not available. If it is available, it will add an
example line to inetd.conf. I'm not usre what's up with the doc-base
errors: in Debian, krb5-doc does install and register with doc-base
--
Missing dependen
> "jean-yves" == jean-yves chateaux writes:
jean-yves> The errors are the results of MIT resolution to exclude
jean-yves> DES/DES3 from the supported enctypes (security reasons).
jean-yves> The parameter "allow_weak_crypto = true" should be added
jean-yves> in the default [lib
Try setting rdns=false in the libdefaults section of krb5.conf.
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
The Kerberos Consortium has a paper on integrating Kerberos into an
application; see http://www.kerberos.org/software/appskerberos.pdf .
I believe that the lucid behavior is correct according to MIT's
documentation: what should be happening is that
* with rdns=true (default), both forward and rev
Well, everything should work fine if you make your DNS consistent.
Honestly if I was going to make a behavior change here I'd have Firefox
call gss_import_name with a name type that does not involve resolution.
--Sam
--
krb5 prefers the reverse pointer no matter what for locating service ticke
In terms of work arounds, if your KDC is an AD KDc, you can add the
final hostnames as ServicePrincipalName attributes on AD for the account
in question. That should make things work either for a Windows server
or for a 1.7+ MIT server.
If your KDC is Unix you can add principals for the final hos
> "Jesper" == Jesper Krogh writes:
Jesper> Hi Russ. I cannot say anything about what other are
Jesper> Would a patch that makes the behaviour configurable be
Jesper> acceptable?
I think that this patch should be accepted only if upstream is
interested in the patch. Given that u
> "jean-yves" == jean-yves chateaux writes:
>> If Allow_weak_crypto = true is making things work better with
>> Windows,
jean-yves> something is broken somewhere else to cause this.
jean-yves> Without this parameter in krb5.conf the auth against the
jean-yves> ADS to
> "J" == J Bruce Fields writes:
J> "We're adding an API to krb5 to fix this for OpenAFS. Because of
J> the way the API is constructed, it's very difficult for GSSD to
J> actually call it."
J> Do you have a pointer to the details?
/* Allows the appplication to override the pr
As Debian maintiner I strongly support this sync request. There are
additional upstream fixes that you can examine from the Debian git
repository. All of these will be included in upstream 1.8. Upstream is
quite conservative about what changes are approved at this point in the
process.
--
Sync
> "Russ" == Russ Allbery writes:
Russ> Jochen writes:
>> After upgrading the krb5 libraries to 1.8 I could not mount my
>> Kerberized NFS4 shares. The following error Message is in the
>> syslog for every mount attempt:
>> rpc.gssd[1298]: rpcsec_gss: gss_init_sec_context
c for unstable or simply
wait for this to hit testing and do an automatic sync.
Attached is the Debian patch for this issue:
commit 2a663b1c184ec10a450b2709bb7525447bb99bac
Author: Sam Hartman
Date: Fri Jan 22 17:13:51 2010 -0500
subject: krb5int_fast_free_state segfaults if state is null
t
See R23482 in upstream subversion; upstream bug 6594
--
credentials cache file not created
https://bugs.launchpad.net/bugs/507490
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
h
> "Colin" == Colin Whittaker writes:
Colin> I built new packages based on Evan's debdiff and have
Colin> deployed them. This removed all the impact we were seeing
Colin> with single password errors causing account lockout.
Colin> This bug has massive impact on user experienc
This has been fixed upstream; I will be fixing for Debian shortly.
** Changed in: krb5 (Ubuntu)
Status: New => Confirmed
** Bug watch added: Debian Bug tracker #557979
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=557979
** Also affects: krb5 (Debian) via
http://bugs.debian.org/c
I released 1.7+dfsg-3 to Debian unstable. That includes a fix to this
bug. I'd recommend that Ubuntu sync that version into a karmic update
once it hits squeeze in order to address this issue. The code changes
between what's in karmic now and 1.7+dfsg-3 are all reasonably
important bug fixes inc
> "Evan" == Evan Broder writes:
Evan> This shouldn't be a problem. We're still in sync phase for
Evan> Ubuntu Lucid, so the new krb5 package will get automatically
Evan> pulled in when it hits Debian testing.
I understand that. The user proposed and I agree at least that this
bu
> "Evan" == Evan Broder writes:
Evan> I think the patch is a little extensive to be directly
Evan> uploaded as a Karmic SRU, but I'll look at pulling a SRU
Evan> patch together for just the bugfixes.
If you don't want to take the full patch, then take a look at
upstream_post_1_7_
lly do want them all even at this point in the process.
Changelog entries since current lucid version 1.8+dfsg~alpha1-7ubuntu1:
krb5 (1.8.1+dfsg-2) unstable; urgency=high
* Fix crash in renewal and validation, Thanks Joel Johnson for such a
prompt bug report, Closes: #577490
-- Sam Hartma
I't my strong guess that no packages in debian outside of krb5 itself
depend on the init_creds_step API, and that is very probably true for
Ubuntu as well. That's one of the main reasons upstream wants to fix it
now: we believe we can do it painlessly if we act before Debian, Ubuntu,
Redhat or Sol
> "Mathias" == Mathias Gug writes:
Mathias> To really make sure things are not broken, we'd have to
Mathias> look at packages started to use krb5_init_creds_step in
Mathias> lucid and make sure they're using the flags in the correct
Mathias> order.
Yes, but I think there are
I don't see a upstream krb5 bug for this issue.
I would recommend against applying this patch until someone familiar
with the SPNEGO security model and the code has evaluated it.
Basically, certain versions of Windows produce bad SPNEGO tokens. It's
appropriate to ignore these in some situation
As best I can tell, the behavior of the patch is explicitly forbidden by
RFC 4178 section 5; see II under clause B and C. However, I'll admit
that the behavior described in Appendix C does not seem consistent with
what I remember for Windows 2000... Perhaps that's only the Windows
behavior for kr
OK, here's where this stands.
We've been discussing on #krbdev, the upstream krb5 IRC channel.
We agree that ignoring a MIC token that is an exact copy of the response
token is security neutral and it looks like both upstream and I are
comfortable making a change to do that even though it seems to
So, it's my understanding that we're still waiting for a confirmation
that this patch has been submitted upstream and for an upstream review
of the patch, right?
--
likewise-open fails to join Windows 2000 SP4 domain
https://bugs.launchpad.net/bugs/551901
You received this bug notification becaus
> "Gerald" == Gerald Carter writes:
Gerald> I think Sam is wanting to know if likewise has submitted the
Gerald> patch to upstream MIT krb5. If that is the case, I'll check
Gerald> on the state of things and update the bug report.
That is. Early on you mentioned you thought thi
> "Thierry" == Thierry Carrez writes:
Thierry> @Sam: let me know if you feel comfortable applying that
Thierry> patch now. Once it's fixed in sid/maverick, I'll push a SRU
Thierry> for lucid.
Sure. I will attempt to get to it this weekend.
Anything you want me to do to make the
My guess is that the DES only checkbox is checked in your AD
configuration for the service account used by the Apache server. If you
clear that checkbox and generate a keytab including both RC4 and DES
keys then I suspect allow_weak_crypto will not be needed.
I'm sorry, but I do not have instruct
The following patch is in karmic. It will cause things to work if a
password server has both v4 and v6 addresses and you have v4
connectivity.
I think the 1.7 server has v6 support, but I don't think the 1.7
client even has v6 support.
However, backporting this patch might make the problem less
> "Chuck" == Chuck Short writes:
Chuck> Thanks I was wondering how I can reproduce this? Regards
Chuck> chuck
Set up openssh-krb5 on a server with a keytab
set GssapiKeyExchange to yes in sshd_config
set gssapiKeyExchange to yes in a client config.
Set the replay cache type to none
*** This bug is a duplicate of bug 1772447 ***
https://bugs.launchpad.net/bugs/1772447
I agree with Russ.
On the Debian side, I would not support a change to krb5-kdc to make
/var/lib/krb5kdc world readable.
I think putting the public cert in /etc/krb5kdc is fine: I can make a
case it's config
So, is this a spec bug or an implementation bug.
Does the current behavior cause anything to break, or is it simply that
implementations have diverged from the spec in tagging of the string.
--Sam
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
This is possibly a duplicate of
https://bugs.launchpad.net/ubuntu/+source/freeipa/+bug/1874915 at least if you
are using freeipa.
As shipped, krb5-kdc does not log to /var/log, but instead logs to syslog
My position is that since krb5's systemd configuration is correct for the
shipped configurat
I'm going to push back on the reassignment to krb5.
I think this is a freeipa bug.
Kerberos's systemd service unit is correct for Kerberos.
freeipa is the one that is deciding it wants to change the Kerberos
logging configuration, and thus is the one that should adjust the
permissions.
Honestly I'd
** Changed in: krb5 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817376
Title:
krb5-admin-server postinst has broken debconf if RUN_KADMIND set in
/etc/d
I think this is basically only a problem on upgrade from older versions of
krb5, in particular from prior to the 1.12 era to the current packaging.
As part of adding support for systemd units, I decided to drop support for the
run_kadmind variable, and bungled the upgrade path.
This is an issue f
Robie any chance I could get you to sync krb5 1.17-2 from Debian
unstable to disco?
It's probably not a big deal but there's no reason not to take the fix
into Disco.
> "Robie" == Robie Basak <1817...@bugs.launchpad.net> writes:
Robie> Thanks Clark and Sam. Ubuntu doesn't support upgrade
Yes, it is because of that change.
is the dn outside of the subtree?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817955
Title:
Getting new "DN is out of the realm subtree" error on adding princip
Hi.
For whatever reason I'm not getting mail when an MP is opened in the
krb5 gitlab.
In general, i think Debian uses its BTS as the todo system of record
moreso than gitlab MPs. I know for myself and I suspect a lot of other
debian developers, a wishlist bug against a package would be the best
w
** Bug watch added: Debian Bug tracker #856307
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856307
** Also affects: krb5 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856307
Importance: Unknown
Status: Unknown
--
You received this bug notification because you
I can put something in debian experimental if that makes the sync
easier.
So, you'd prefer just the Debian 1.15-1 with bug fixes rather than a
1.15.1?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1683
> "Joshua" == Joshua Powers writes:
Joshua> If we want to fix this in zesty, then a release with only
Joshua> the bug fixes would be desired. That could be SRU'ed
Joshua> assuming it is not too big of a change such that it would
Joshua> limit the exposure to new issues or chan
> "Joshua" == Joshua Powers writes:
Joshua> If we want to fix this in zesty, then a release with only
Joshua> the bug fixes would be desired. That could be SRU'ed
Joshua> assuming it is not too big of a change such that it would
Joshua> limit the exposure to new issues or chan
As a FYI, upstream has relicensed the file under their standard license
with permission from the author.
Coming to Debian soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1644595
Title:
krb5-1.13
Langasek, Closes: #833798
* Fix kdb5_util create on 32-bit platforms, thanks Greg Hudson, Closes:
#834035
-- Sam Hartman Mon, 05 Sep 2016 21:03:14 -0400
** Affects: krb5 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a
I've forwarded this to upstream krbdev.mit.edu #8506
I don't know if this is pkcs 11 2.10 specific or specific to the backend in
question, but it's worth having upstream take a look.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
Include a link to the buildlog and i'll take a look.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1592841
Title:
FTBFS on ppc64el, blocks updates of all packages depending on krb5,
for example CU
Looks simple; preparing fix
** Changed in: krb5 (Ubuntu)
Assignee: (unassigned) => Sam Hartman (hartmans)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1592841
Title:
FTBFS on ppc64el, blo
ource/krb5/+bug/1592841/+attachment/4684512/+files/krb5_1.14.2+dfsg-1ubuntu1.debdiff
** Changed in: krb5 (Ubuntu)
Assignee: Sam Hartman (hartmans) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
O, sorry.
I knew that seemed simpler than it should have been:-)
Yeah, you could stick single-debian-patch in debian/source/options and
it would work, but I'll do it right.
** Patch removed: "krb5_1.14.2+dfsg-1ubuntu1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1592841/+attac
I've replaced the debdiff with one that hopefully works. I'm sorry for
spacing at the controls there. Perhaps yearning for a simpler time:-)
** Patch added: "revised patch take 2"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1592841/+attachment/4684531/+files/krb5_1.14.2+dfsg-1ubuntu1
** Patch added: "krb5_1.14.2+dfsg-1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1592841/+attachment/4684544/+files/krb5_1.14.2+dfsg-1ubuntu2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
Try this. I've fixed the new instance of the error as well. Incremented
the version number so the patch has a different name, but you may not
want to do that if you end up uploading
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
> "Till" == Till Kamppeter <1592...@bugs.launchpad.net> writes:
Till> Build the package on the system which you have at hand (amd64,
Till> i386, ...), directing the build output into a file. Search
Till> through the output to see whther there are any compiler
Till> warnings and
> "Robie" == Robie Basak <1643...@bugs.launchpad.net> writes:
Robie> @Bruce Thank you for detailing your testing. In your test
Robie> suite, do you cover any interoperability with SPNEGO but
Robie> not-Windows, whether in integration or code path coverage?
Robie> That's the use
I think it logs to syslog.
Are you seeing logging configuration that is failing because of the
systemd configuration, or are you saying that if the systemd
configuration is updated *and* a logging stanza is added it would log to
this file?
I would e xpect the kdc to log to /var/log/auth.log out of
** Also affects: moonshot-ui
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1590489
Title:
Feature request: To allow Moonshot UI to also manage SAML ECP
In Debian unstable installing krb5-kdxc-ldap automatically changes the
order. This could be backported.
"Clint Byrum" wrote:
>Since both services may depend on the other in ways that will break, we
>can only support a default configuration.
>
>The server guide currently does not have kerberos de
This bug also exists in Debian; here's a patch I'll upload in a future
Debian krb5 version that will eventually make its way into Ubuntu.
** Patch added:
"0001-Fix-default-location-of-kpropd.acl-in-kpropd.M-LP-68.patch"
https://bugs.launchpad.net/bugs/688464/+attachment/1761750/+files/0001-F
urrent vivid version 0.9.2-3:
moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium
* Incorporate upstream deltas:
- 6dbf073: Allow white space in CA certificates, Closes: #781312
- 90f04c98: Don't shut down openssl on last context deletion,
Closes: #781311
-- Sam Hart
Hi. What's going on here is that it seems there are cases where on
process exit, ld.so will destruct the plugins before it destructs the
dlopening library. So it sets m_inited to 0. But as part of its
finalizer the library tries to clean up its resources, and dlcloses the
plugins. Getting you t
Old stash files are in fact byte order and probably but I'm not sure
word size dependent. Look at the add_mkey command to kdb5_util. I
think if you add a new master key and write it out to a new keytab
format stash file then all should be well.
If the database was created with 1.9.1 then I would
kadmind to exhaust all
available memory. (Closes: #813126)
-- Sam Hartman Tue, 23 Feb 2016 08:54:09 -0500
** Affects: krb5 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
> "Iain" == Iain Lane writes:
Iain> Thanks Sam, I've uploaded krb5. ** Changed in: krb5 (Ubuntu
Iain> Trusty) Status: Triaged => In Progress
Hi.
I haven't seen this hit proposed yet.
Is that expected? What is the next step?
--
You received this bug notification because you are a
I enabled proposed, confirmed that as I described in the initial test case
gss-server segfaults with 1.12+dfsg-2ubuntu4. Then I installed
libgssapi-krb5-2 from trusty-proposed. That pulled in most of the other krb5
packages as I'd expect all version 1.12+dfsg-2ubuntu5.
I ran gss-server and it
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Title:
libgssapi-krb5-2: segfault when mechglue loops endlessly on call to
To test:
Install precise.
On precise, enable multiple architectures (say amd64 and i386)
install libkadm5srv-mit8.
Update your sources.list to trusty, try installing libkadm5srv-mit8.
I'd expect that to fail.
Update your sources.list to also include trusty-proposed.
Upgrade libkadm5srv-mit8; I'd
Marking confirmed because I started tracking this down based on a report
to the Moonshot project from Rhys Smith which ended up being this issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Public bug reported:
There's a bug fixed in krb5 1.12.1+dfsg-2 (just uploaded to Debian) where if a
gss-api mechanism is dynamically loaded, and that mechanism uses symbols from
libgssapi_krb5, and doesn't provide certain optional entry points added in krb5
1.12, then calling one of those entry
> "Luke" == Luke Howard writes:
Luke> How about grabbing this commit from browserid: commit
Luke> e51f544e6c0b92c88163d1b0f4ae110869abf070 Author: Luke Howard
Luke> Date: Thu Oct 24 18:10:24 2013 -0700
That's something to consider for the specific case of moonshot.
However, the
Here's the patch from debian krb5 1.12.1+dfsg-2
** Patch added: "0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1326500/+attachment/4125522/+files/0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
--
You received
I've built the linked branch in ppa:hartmans/ubuntu-fixes for trusty.
With these packages installed and the attached radsec.conf installed as
/usr/local/etc/radsec.conf, then gss-server starts correctly as expected.
Without radsec.conf installed it prints an error about being unable to acquire
cr
Since I'd really like to see the gss infinite loop patch into trusty
I'm going to update the branch for that to also include this fix and
build packages.
Expect a branch link in a few minutes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
See https://launchpad.net/~hartmans/+archive/ubuntu-fixes packages
building. I had to upload with a different version number on the branch
because that ppa already had a krb5 build.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
Not criticising here, but asking.
At a level deeper than "it causes apt to work correctly," why is adding
replaces a reasonable fix?
Nothing in libkdb5-7 actually replases libkadm5-mit8
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
> "Martin" == Martin Pitt writes:
No complains at all.
I was just hoping to learn from you guys.
I actually probably want this delta for wheezy->jessie.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
I'm happy to upload a new krb5 to debian so you can sync it if you want
that approach.
I'm also happy if Ubuntu wants to go with a binary rebuild of krb5.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
Please see https://launchpad.net/~hartmans/+archive/ubuntu/krb5 for
trusty packages that should fix the problem.
Can I get confirmation from Tom or someone else that without these
packages trusty fails the reproduce test in comment #1 and with them, it
succeeds the test proposed in comment #1?
I
I'm sorry, can I get someone to test the packages at
https://launchpad.net/~hartmans/+archive/ubuntu/ubuntu-fixes
not the URI I gave in the previous message.
I pulled the wrong PPA off my home page.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
** Description changed:
- In some conditions, propagating a kerberos database to a slave KDC server can
stall.
+ In some conditions, propagating a kerberos database to a slave KDC server or
performing other database operations can stall. As we've investigated the
issue, it looks like a databas
hi.
If I'm understanding the SRU procedure correctly,
I think we need to get someone to review the referenced bug for
inclusion in trusty.
https://bugs.launchpad.net/gcc/+bug/1347147
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
>>>>> "Sam" == Sam Hartman writes:
Sam> hi. If I'm understanding the SRU procedure correctly, I think
Sam> we need to get someone to review the referenced bug for
Sam> inclusion in trusty.
Sorry, launchpad strips more mail headers than I
debdiff included
** Patch added: "debdiff between current trusty and linked branch"
https://bugs.launchpad.net/gcc/+bug/1347147/+attachment/4166949/+files/krb5-trusty-stable.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ch to switch to TAILQ macros instead of CIRCLEQ macros,
to work around an issue with certain gcc versions. This is expected to
resolve Ubuntu bug (LP: #1347147).
[ Sam Hartman ]
* Include a quick and dirty patch so we build cleanly with -O3 fixing
incorrect may be uniniti
I've request a krb5 sync from debian unstable in
https://bugs.launchpad.net/bugs/1352438 that should fix this issue and
include some needed security fixes in utopic.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
*** This bug is a security vulnerability ***
Public security bug reported:
Fix LDAP key data segmentation [CVE-2014-4345]
For principal entries having keys with multiple kvnos (due to use of
-keepold), the LDAP KDB module makes an attempt to store all the keys
having the same
This is fixed in Debian in 1.12.1+dfsg-87, currently in unstable. The
only change between -6 (utopic) and -7 is the fix to this bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354714
Title:
buf
Here's an ubdated debdiff that includes the security update applied to
trusty. I'm still waiting for a sponsor for this.
** Patch removed: "debdiff between current trusty and linked branch"
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1347147/+attachment/4166949/+files/krb5-trusty-stab
> "Robie" == Robie Basak <1347...@bugs.launchpad.net> writes:
Robie> Thanks Sam. I'm sorry I can't sponsor krb5, only triage the
Robie> bug and guide it through to sponsorship. It looks like you
Robie> know what you're doing here, so I guess we'll just need to
Robie> wait for a
Stefan, I've prepared packages that should fix the problem available at
https://launchpad.net/~hartmans/+archive/ubuntu-fixes
that page includes instructions on how to add the archive to your system.
After you do that please update at least libgssapi-krb5-2 and let us know
whether it fixes the
Did you update moonshot-gs-eap?,
There's a bad version the produce is that
Stefan Paetow wrote:
>Sam, I now get a segfault in gss-server:
>
>Reading symbols from /usr/bin/gss-server...(no debugging symbols
>found)...done.
>(gdb) set args -verbose host@localhost
>(gdb) run
>Starting program: /usr/
OK, that's probably the cause of the segfault.
I've deleted the broken packages from our debian and ubuntu archives.
Unfortunately getting fixed packages to reappear is a bit annoying at
the moment.
The packages in
http://repository.project-moonshot.org/debian-moonshot/pool/main/m/moonshot-gss-eap
> "Stefan" == Stefan Paetow writes:
Stefan> Ok, I've reinstalled the moonshot libraries, the error has
Stefan> gone away and there are no more segfaults.
OK.
So, if I'm understanding correctly the libgssapi-krb5-2 from my PPA did
fix the problem.
There was a segfault introduced by an
Hi. Here's the rationale behind the krb5-kdc krb5-kadmin-server split.
The krb5-kdc package includes the things you'd need on a traditional slave KDC.
One of the key things about a slave KDC is that the database is read-only.
The slave is not making any changes to the database, locally or othe
** Changed in: krb5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1332985
Title:
Add the krb5-send-pr command to the ubuntu package
To manage notifications ab
With the upload of krb5 1.12.1+dfsg-3ubuntu1 to utopic, this is fixed in
utopic. Any additional help I can provide getting this into trusty?
** Changed in: krb5 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
1 - 100 of 125 matches
Mail list logo