Using the reproduction steps in the description, I re-confirmed that
with the current zesty version joining the domain fails because of that
missing directory. After installing freeipa-{client,common} from
-proposed, joining the domain now succeeds.
** Tags removed: verification-needed-zesty
** Ta
This bug was fixed in the package freeipa - 4.4.3-3ubuntu2.1
---
freeipa (4.4.3-3ubuntu2.1) zesty; urgency=medium
* client.dirs: Ship /etc/krb5.conf.d, because not having that breaks
the installer when krb5.conf tries to include it. (LP: #1693154)
-- Timo Aaltonen Wed, 14 Ju
The verification of the Stable Release Update for freeipa has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
*** This bug is a security vulnerability ***
Public security bug reported:
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in
jwcrypto before 0.3.2 lacks the Random Filling protection mechanism,
which makes it easier for remote attackers to obtain cleartext data via
a Million M
17.04 and 17.10 are not affected since they publish the fixed version
0.3.2. 16.04 appears to be affected, but the code is significantly
different. I've requested info from the source project owner to test my
proposed patch for 16.04.
--
You received this bug notification because you are a member
5 matches
Mail list logo