diff options
author | Tom Yu <tlyu@mit.edu> | 2004-03-23 22:19:40 +0000 |
---|---|---|
committer | Tom Yu <tlyu@mit.edu> | 2004-03-23 22:19:40 +0000 |
commit | 49cff71fa4b115f43ab2bc0a5bcd7346e1033ae9 (patch) | |
tree | c5e1c51f1cb6796342fd992f6cc6c360214cfd63 /README | |
parent | dbf356071ca2612a0f613c850a2d8beffb1f4e48 (diff) | |
download | krb5-49cff71fa4b115f43ab2bc0a5bcd7346e1033ae9.zip krb5-49cff71fa4b115f43ab2bc0a5bcd7346e1033ae9.tar.gz krb5-49cff71fa4b115f43ab2bc0a5bcd7346e1033ae9.tar.bz2 |
krb5-1.3.3-beta1
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@16205 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'README')
-rw-r--r-- | README | 29 |
1 files changed, 23 insertions, 6 deletions
@@ -1,4 +1,4 @@ - Kerberos Version 5, Release 1.3.2 + Kerberos Version 5, Release 1.3.3 Release Notes The MIT Kerberos Team @@ -7,20 +7,20 @@ Unpacking the Source Distribution --------------------------------- The source distribution of Kerberos 5 comes in a gzipped tarfile, -krb5-1.3.2.tar.gz. Instructions on how to extract the entire +krb5-1.3.3.tar.gz. Instructions on how to extract the entire distribution follow. If you have the GNU tar program and gzip installed, you can simply do: - gtar zxpf krb5-1.3.2.tar.gz + gtar zxpf krb5-1.3.3.tar.gz If you don't have GNU tar, you will need to get the FSF gzip distribution and use gzcat: - gzcat krb5-1.3.2.tar.gz | tar xpf - + gzcat krb5-1.3.3.tar.gz | tar xpf - -Both of these methods will extract the sources into krb5-1.3.2/src and -the documentation into krb5-1.3.2/doc. +Both of these methods will extract the sources into krb5-1.3.3/src and +the documentation into krb5-1.3.3/doc. Building and Installing Kerberos 5 ---------------------------------- @@ -59,6 +59,23 @@ http://krbdev.mit.edu/rt/ and logging in as "guest" with password "guest". +Major changes in 1.3.3 +---------------------- + +* [2277] In sendto_kdc, a socket leak on connection failure was fixed. + Reported by Bill Dodd. + +* [2284] Fixed accept_sec_context to use a replay cache in the + GSS_C_NO_CREDENTIAL case. Reported by Cesar Garcia. + +* [2384] A memory leak in the TCP handling code in the KDC has been + fixed. Thanks to Will Fiveash. + +* [2430] Fixed a crash in the MSLSA ccache. + +* [2453] The AES string-to-key function no longer returns a pointer to + stack memory when given a password longer than 64 characters. + Major changes in 1.3.2 ---------------------- |