Age | Commit message (Collapse) | Author | Files | Lines |
|
------------------------------------------------------------------------
r20611 | raeburn | 2008-08-06 11:51:48 -0400 (Wed, 06 Aug 2008) | 7 lines
ticket: new
subject: bad free in kprop
target_version: 1.6.4
tags: pullup
Don't free automatic storage after sending database.
ticket: 6065
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@23656 dc483132-0cff-0310-8789-dd5450dbe970
|
|
Fix integer underflow in AES and RC4 decryption.
[MITKRB5-SA-2009-004, CVE-2009-4212]
ticket: 6638
target_version: 1.6.4
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@23653 dc483132-0cff-0310-8789-dd5450dbe970
|
|
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22454 dc483132-0cff-0310-8789-dd5450dbe970
|
|
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22452 dc483132-0cff-0310-8789-dd5450dbe970
|
|
ticket: 6535
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22450 dc483132-0cff-0310-8789-dd5450dbe970
|
|
commit of default option values in BKWconfig.xml.
ticket: 6535
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22449 dc483132-0cff-0310-8789-dd5450dbe970
|
|
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22447 dc483132-0cff-0310-8789-dd5450dbe970
|
|
This is a jumbo pullup of multiple KfW-related changes. The are
primarily build system fixes, including changes to enable building on
amd64. Included are some changes from branches/kpkoch-ccapi that have
not yet been merged to the trunk. Relevant RT ticket numbers include:
5817
5819
6007
ticket: 6535
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22445 dc483132-0cff-0310-8789-dd5450dbe970
|
|
version_fixed: 1.6.4
pull up r22443 from trunk
------------------------------------------------------------------------
r22443 | tlyu | 2009-07-16 21:35:58 -0400 (Thu, 16 Jul 2009) | 8 lines
ticket: 6531
target_version: 1.6.4
tags: pullup
subject: include win-mac.h in gssftp/ftp/cmds.c for HAVE_STDLIB_H
gssftp/ftp/cmds.c had a preprocessor conditional on HAVE_STDLIB_H that
will not evaluate correctly on WIN32 unless win-mac.h is included first.
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22444 dc483132-0cff-0310-8789-dd5450dbe970
|
|
reported on the 1.6 branch.
------------------------------------------------------------------------
r20479 | raeburn | 2008-06-26 20:31:59 -0400 (Thu, 26 Jun 2008) | 8 lines
ticket: 5925
status: open
Don't do FD_SETSIZE check on Windows.
Also, for form's sake, use closesocket instead of close inside the check.
Kevin or Jeff, could you please verify that the code works again?
ticket: 6433
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22442 dc483132-0cff-0310-8789-dd5450dbe970
|
|
------------------------------------------------------------------------
r20608 | raeburn | 2008-08-05 20:05:47 -0400 (Tue, 05 Aug 2008) | 9 lines
ticket: new
subject: fix cleanup code in allocating preauth info
target_version: 1.6.4
tags: pullup
After an allocation failure, free up the previously allocated array
elements by counting back down to zero, not continuing to count up
until we hit zero.
ticket: 6064
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22429 dc483132-0cff-0310-8789-dd5450dbe970
|
|
------------------------------------------------------------------------
r20580 | raeburn | 2008-07-25 15:19:06 -0400 (Fri, 25 Jul 2008) | 8 lines
ticket: new
target_version: 1.6.4
tags: pullup
subject: fix possible uninit variable use in error path
Clear gss_client and gss_target before any possible branch to 'error',
where they can be used.
ticket: 6053
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22428 dc483132-0cff-0310-8789-dd5450dbe970
|
|
------------------------------------------------------------------------
r20485 | raeburn | 2008-06-26 23:33:14 -0400 (Thu, 26 Jun 2008) | 8 lines
ticket: new
target_version: 1.6.4
tags: pullup
subject: use-after-free bugs
Fix some bugs with storage being used immediately after being freed.
None look like anything an attacker can really manipulate AFAICT.
ticket: 5998
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22427 dc483132-0cff-0310-8789-dd5450dbe970
|
|
------------------------------------------------------------------------
r20482 | raeburn | 2008-06-26 22:51:09 -0400 (Thu, 26 Jun 2008) | 5 lines
ticket: 5997
Memory leak, and possible freed-memory dereference, in an error (small
allocation failure) path.
------------------------------------------------------------------------
r20481 | raeburn | 2008-06-26 22:47:06 -0400 (Thu, 26 Jun 2008) | 9 lines
ticket: new
target_version: 1.6.4
subject: misc memory leaks
tags: pullup
Fix various memory leaks that show up mostly in error cases (e.g.,
failure to allocate one small object, and then we forget to free
another one).
ticket: 5997
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22426 dc483132-0cff-0310-8789-dd5450dbe970
|
|
pull up rxxxx from trunk
The asn1_decode_generaltime() function can free an uninitialized
pointer if asn1buf_remove_charstring() fails.
ticket: 6448
tags: pullup
target_version: 1.6.4
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22181 dc483132-0cff-0310-8789-dd5450dbe970
|
|
pull up rxxxx from trunk
asn1buf_imbed() can perform pointer arithmetic that causes the "bound"
pointer of the subbuffer to be less than the "next" pointer. This can
lead to malloc() failure or crash.
In asn1buf_imbed(), check the length before doing arithmetic to set
subbuf->bound. In asn1buf_remove_octetstring() and
asn1buf_remove_charstring(), check for invalid buffer pointers before
executing an unsigned length check against a (casted to size_t)
negative number.
ticket: 6447
tags: pullup
target_version: 1.6.4
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22180 dc483132-0cff-0310-8789-dd5450dbe970
|
|
pull up rxxxxx from trunk
SPNEGO can read beyond the end of a buffer if the claimed DER length
exceeds the number of bytes in the input buffer. This can lead to
crash or information disclosure.
Thanks to Apple for reporting this vulnerability and providing
patches.
ticket: 6446
tags: pullup
target_version: 1.6.4
version_fixd: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22179 dc483132-0cff-0310-8789-dd5450dbe970
|
|
sent on error.
ticket: 6426
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22178 dc483132-0cff-0310-8789-dd5450dbe970
|
|
pull up r22084 from trunk
acc_ctx_new() can return an error condition without establishing a
SPNEGO context structure. This can cause a null pointer dereference
in cleanup code in spnego_gss_accept_sec_context().
ticket: 6426
tags: pullup
target_version: 1.6.4
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@22104 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20573@cathode-dark-space: jaltman | 2008-07-23 11:09:15 -0400
ticket: 6047
tags: pullup
The NIM error reporting functions (in src/windows/identity/kherr ) keep
track of the the error message with the highest severity level that was
reported for a specific error reporting context. However, if another
error message of the same severity is reported, the error message being
tracked will be updated to be the newly received error.
The user will often only be notified of the error message that was
tracked for a specific operation. Therefore, tracking the last message
with the highest priority has the unfortunate side-effect of not
reporting the cause of a failure.
This patch changes the condition for updating the tracked error message
to be the first message with the highest severity.
ticket: 6047
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20641 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20572@cathode-dark-space: jaltman | 2008-07-23 11:04:26 -0400
ticket: 5745
tags: pullup
This patch modifies the NIM Kerberos v5 plug-in to use the
krb5_get_error_message() function to look up the error string
if the call to krb5_get_init_creds_password() fails. If the call
to krb5_get_error_message() fails, the caller will failover to
the previous method of looking up a suitable error message based
on the error code.
ticket: 5745
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20640 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20571@cathode-dark-space: jaltman | 2008-07-23 10:44:50 -0400
ticket: 6046
tags: pullup
The /src/windows/identity/plugins/common/dynimport.{c,h} files are used
by the NIM Kerberos v5 plug-ins for run-time dynamic linking. They
currently do not declare or import the following functions:
krb5_get_error_message()
krb5_free_error_message()
krb5_clear_error_message()
This patch adds declarations and definitions required for locating these
functions. Relies on the addition of these functions to the prototype
list in the Pismere loadfuncs-krb5.h. See ticket 6045.
ticket: 6046
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20639 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20570@cathode-dark-space: jaltman | 2008-07-23 10:38:27 -0400
ticket: 5605
tags: pullup
cw_handle_header_msg():
The behavior of the HDN_ENDTRACK notification has changed slightly on
Vista. HDM_GETITEMRECT, when used while handling HDN_ENDTRACK, returns
the item extents that were there prior to the user starting the resizing
operation. Earlier it would return the extents that resulted from the
resizing operation.
This resulted in a visual update problem on Windows Vista/2008
in the NIM Advanced View.
ticket: 5605
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20638 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20478@cathode-dark-space: raeburn | 2008-06-26 20:22:43 -0400
ticket: new
target_version: 1.6.4
Fix off-by-one error in range check on file descriptor number.
ticket: 5995
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20587 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20127@cathode-dark-space: raeburn | 2007-10-17 20:14:01 -0400
Reject socket fds > FD_SETSIZE.
ticket: 5995
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20586 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20553@cathode-dark-space: jaltman | 2008-07-21 14:48:03 -0400
ticket: new
subject: Assign fixed ordinals to comerr32.dll exports
component: krb5-libs
tags: pullup
All of the other libraries on Windows have fixed assignments
of ordinals to the exported functions. Assign the ordinals
that were in use in the last public release, kfw 3.2.2, so
that they will remain constant into the future in case additional
exports are added to the library.
ticket: 6040
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20585 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20558@cathode-dark-space: jaltman | 2008-07-21 16:33:53 -0400
ticket: 5840
tags: pullup
kadm5_decrypt_key(). This patch prevents the returned keyblock's
enctype from being coerced to the requested 'ktype' if the requested
'ktype' == -1. A ktype of -1 is documented as meaning "to be ignored".
ticket: 5840
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20584 dc483132-0cff-0310-8789-dd5450dbe970
|
|
ticket: 5442
Fix one missed rename of "exit" label to "done".
ticket: 5442
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20583 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20574@cathode-dark-space: jaltman | 2008-07-23 12:03:40 -0400
ticket: 5442
replace "exit" label with "done"
ticket: 5442
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20582 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20559@cathode-dark-space: jaltman | 2008-07-21 16:47:35 -0400
ticket: 5442
tags: pullup
This patch addresses the issues raised in this ticket and ticket 5936.
(a) In the case where 'cred_handle' != 'verifier_cred_handle'[1]
krb5_gss_accept_sec_context() leaks the 'cred_handle' in the success
case and the failure cases that result in returning from the function
prior to reaching the end of the function.
(b) The meaningful 'minor_status' return value is destroyed during the
cleanup operations.
The approach taken is to add a new 'exit:' label prior to the end of the
function through which all function returns after reaching the 'fail:'
label will goto. After 'exit:', the 'cred_handle' will be released and
if there is a krb5_context 'context' to be freed, the error info will be
saved and krb5_free_context() will be called.
In the success case, the krb5_context is saved in the gss context and we
now set 'context' to NULL to prevent it from being freed.
In order to preserve the minor_status return code, a 'tmp_minor_status'
variable is added that is used after the 'fail:' label in calls to
krb5_gss_delete_sec_context() and krb5_gss_release_cred().
[1] If 'verifier_cred_handle' is non-NULL, then 'cred_handle' is set to
the value of 'verifier_cred_handle'.
ticket: 5442
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20581 dc483132-0cff-0310-8789-dd5450dbe970
|
|
(includes unrelated cleanup of dead assignment)
r20561@cathode-dark-space: raeburn | 2008-07-21 16:59:24 -0400
ticket: 5980
Another check for null return from krb5_cc_default_name.
ticket: 5980
version_fixed: 1.6.4
status: resolved
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20565 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20551@cathode-dark-space: jaltman | 2008-07-21 13:44:43 -0400
ticket: 5080
tags: pullup
ccdefault.c:
krb5_cc_default_name() is permitted to return a NULL
pointer as a valid output. Passing a NULL pointer to
strcmp() will result in an exception as NULL is not
a valid input parameter to strcmp().
Save the output of krb5_cc_default_name() to a variable
and modify the conditional to set the new default ccache
name in the case where there is no existing default
ccache name.
ticket: 5980
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20564 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20557@cathode-dark-space: jaltman | 2008-07-21 16:30:44 -0400
ticket: 5839
tags: pullup
krb5_string_to_keysalts()
Fix an infinite loop in the parsing of 'kp'
ticket: 5839
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20563 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20555@cathode-dark-space: jaltman | 2008-07-21 15:43:21 -0400
ticket: 5895
tags: pullup
There are two mutex locking issues that Roland Dowdeswell noticed in
the memory ccache. The first one is in cc_memory.c:krb5_mcc_initialize().
When it is free(3)ing the existing credentials it does not lock the
data structures and hence two separate threads can run into issues.
The same problem exists in cc_memory.c:krb5_mcc_destroy().
ticket: 5895
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20562 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20527@cathode-dark-space: tlyu | 2008-07-15 17:43:35 -0400
ticket: new
subject: krb5_get_cred_via_tkt() should null out_cred on errors
tags: pullup
target_version: 1.6.4
component: krb5-libs
Helper function krb5_kdcrep2creds(), called from
krb5_get_cred_via_tkt(), should null its output pointer after freeing
allocated memory, to avoid returning an invalid pointer.
ticket: 6033
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20550 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20532@cathode-dark-space: tlyu | 2008-07-17 11:44:43 -0400
ticket: 6030
tags: pullup
target_version: 1.6.4
Apply patch from Mark Phalan to correctly use progname instead of
argv[0].
ticket: 6030
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20549 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20531@cathode-dark-space: tlyu | 2008-07-16 19:01:54 -0400
ticket: 6028
target_version: 1.6.4
tags: pullup
Apply patch from Mark Phalan to initialize progname before use.
ticket: 6028
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20548 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20536@cathode-dark-space: tlyu | 2008-07-17 19:40:32 -0400
ticket: 6018
target_version: 1.6.4
tags: pullup
In krb5_rc_io_creat(), unlink any existing rcache file before trying
to create a new rcache. This allows better recovery from corrupt
rcache files.
ticket: 6018
status: resolved
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20547 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20503@cathode-dark-space: tlyu | 2008-07-09 15:54:56 -0400
ticket: new
tags: pullup
component: krb5-libs
subject: add copyright to lib/crypto/enc_provider/aes.c
target_version: 1.6.4
lib/crypto/enc_provider/aes.c was missing a copyright statement.
Added.
ticket: 6022
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20524 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20480@cathode-dark-space: raeburn | 2008-06-26 21:26:08 -0400
ticket: new
subject: fix free of automatic storage
target_version: 1.6.4
tags: pullup
Fix a possible free of automatic storage that can happen on an
(unlikely) encoding failure.
ticket: 5996
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20523 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20477@cathode-dark-space: raeburn | 2008-06-26 20:20:33 -0400
ticket: new
target_version: 1.6.4
Fix possible null pointer deref, possible uninit ptr use, possible
leak in unlikely small-allocation failure case.
ticket: 5994
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20522 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20304@cathode-dark-space: raeburn | 2008-04-18 15:31:47 -0400
ticket: new
subject: fix possible buffer overrun in handling generic-error return
target_version: 1.6.5
tags: pullup
Jeff Altman reported this, based on a crash seen in KfW in the wild.
The krb5_data handle used to describe the message field returned by the KDC is
not null-terminated, but we use a "%s" format to incorporate it into an error
message string. In the right circumstances, garbage bytes can be pulled into
the string, or a memory fault may result.
However, as this is in the error-reporting part of the client-side code for
fetching new credentials, it's a relatively minor DoS attack only, not a
serious security exposure. Should be fixed in the next releases, though.
ticket: 5944
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20521 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20296@cathode-dark-space: raeburn | 2008-03-28 21:09:00 -0400
ticket: new
subject: Coverity CID 101: Fix minor bounds check error.
target_version: 1.6.4
tags: pullup
Coverity CID 101: Fix minor bounds check error.
ticket: 5933
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20520 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20413@cathode-dark-space: jaltman | 2008-06-18 15:36:49 -0400
ticket: 5924
tags: pullup
This patch is derived from a patch originally submitted to RT
by: Nik Conwell <nik@bu.edu>
krb5_set_real_time() accepts as input the time of the KDC
or an application server as a combination of seconds and
microseconds. Often it is the case that the time source
does not provide the real time with less than one second
granularity. Up until this patch such a caller would fill
in the microseconds parameter as zero. krb5_set_real_time()
would treat the zero microseconds as the actual reported
time and compute a microsecond based offset.
During a one second window subsequent calls to
krb5_set_real_time() would have an ever increasing offset
size until the number of seconds is incremented. This
in turn produces a side effect in which the microseconds
value of the local clock is effectively erased.
If there are multiple processes or threads on the same
machine each requesting service tickets using the same
client principal for the same service principal where
the number of seconds reported by the KDC are equivalent,
then they will now all create authenticators with
exactly the same timestamp. As a result, the authenticating
service will detect a replay attack even though the
authenticators are actually unique. The replay cache
only maintains a tuple of client, server and timestamp.
This patch modifies the interpretation of the microseconds
parameter. If -1 is specified, the microseconds offset is
ignored.
ticket: 5924
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20519 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20509@cathode-dark-space: tlyu | 2008-07-09 22:04:03 -0400
ticket: 5632
Apply patch from Apple to handle missing krb5.conf for zeroconf
situations.
ticket: 5632
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20518 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20311@cathode-dark-space: rra | 2008-04-28 19:05:27 -0400
Ticket: new
Subject: Properly escape - in kdb5_ldap_util man page
Component: krb5-doc
Version_Reported: 1.6.3
Target_Version: 1.6.4
Tags: pullup
The LDAP plugin introduced a new man page which has unescaped hyphens.
Unicode-aware groffs may convert those to real hyphens rather than
the intended ASCII hyphen. This patch adds backslashes in front of
all the bare hyphens that I plus Debian's lintian program could find
to force interpretation as ASCII hyphens.
ticket: 5953
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20517 dc483132-0cff-0310-8789-dd5450dbe970
|
|
r20316@cathode-dark-space: rra | 2008-05-10 23:54:41 -0400
Ticket: 5544
Tags: pullup
Fix a typo in krb5.conf: ldap_server should be ldap_servers, as the
latter is what the LDAP KDB plugin looks for.
ticket: 5544
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20516 dc483132-0cff-0310-8789-dd5450dbe970
|
|
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20288 dc483132-0cff-0310-8789-dd5450dbe970
|
|
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20286 dc483132-0cff-0310-8789-dd5450dbe970
|
|
ticket: 5919
version_fixed: 1.6.4
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20283 dc483132-0cff-0310-8789-dd5450dbe970
|