Is there a patch to the 1.2.8 series to avoid:
Buffer overflow in krb5_aname_to_localname functionality. See advisories index or advisory text.


Or is 1.2.8 not susceptable?

I hadn't seen any patches for pre-1.3.0. Are y'all officially considering 1.2.* "old as a brick" and time to upgrade?

Daniel

--
/\\\----------------------------------------------------------------------///\
\ \\\      Daniel Henninger           http://www.vorpalcloud.org/        /// /
 \_\\\      North Carolina State University - Systems Programmer        ///_/
    \\\                   Information Technology <IT>                  ///
     """--------------------------------------------------------------"""
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to