*** This bug is a security vulnerability ***
Public security bug reported:
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in
jwcrypto before 0.3.2 lacks the Random Filling protection mechanism,
which makes it easier for remote attackers to obtain cleartext data via
a Million
The verification of the Stable Release Update for freeipa has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
This bug was fixed in the package freeipa - 4.4.3-3ubuntu2.1
---
freeipa (4.4.3-3ubuntu2.1) zesty; urgency=medium
* client.dirs: Ship /etc/krb5.conf.d, because not having that breaks
the installer when krb5.conf tries to include it. (LP: #1693154)
-- Timo Aaltonen
Using the reproduction steps in the description, I re-confirmed that
with the current zesty version joining the domain fails because of that
missing directory. After installing freeipa-{client,common} from
-proposed, joining the domain now succeeds.
** Tags removed: verification-needed-zesty
**
4 matches
Mail list logo