CVE-2017-11462 -- automatic sec context deletion could lead to double-free

Related Vulnerabilities: CVE-2017-11462  

Debian Bug report logs - #873563
CVE-2017-11462 -- automatic sec context deletion could lead to double-free

version graph

Reported by: Benjamin Kaduk <kaduk@mit.edu>

Date: Tue, 29 Aug 2017 01:12:02 UTC

Severity: normal

Tags: fixed-upstream, security, upstream

Found in version krb5/1.15-1

Fixed in version krb5/1.15.2-1

Done: Benjamin Kaduk <kaduk@mit.edu>

Bug is archived. No further changes may be made.

Forwarded to http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 01:12:04 GMT) (full text, mbox, link).


Acknowledgement sent to Benjamin Kaduk <kaduk@mit.edu>:
New Bug report received and forwarded. Copy sent to Sam Hartman <hartmans@debian.org>. (Tue, 29 Aug 2017 01:12:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Benjamin Kaduk <kaduk@mit.edu>
To: submit@bugs.debian.org
Subject: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Mon, 28 Aug 2017 20:03:37 -0500
Package: libgssapi-krb5-2
Version: 1.15-1
Tags: security

Upstream has committed a change that causes libgssapi-krb5 to not
automatically free a security context when an error is encountered on
the second or subsequent call to gss_init_sec_context() or
gss_accept_sec_context(), as this is frequently unexpected by
application code and could lead to a double-free situation.



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 12:03:02 GMT) (full text, mbox, link).


Acknowledgement sent to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. (Tue, 29 Aug 2017 12:03:02 GMT) (full text, mbox, link).


Message #10 received at submit@bugs.debian.org (full text, mbox, reply):

From: Sam Hartman <hartmans@debian.org>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: submit@bugs.debian.org, 873563@bugs.debian.org
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Tue, 29 Aug 2017 08:00:10 -0400
Wait...
Is that actually even legal under RFC 1964?
Doesn't this lead to leaks for correctly written applications?

--Sam



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 12:09:03 GMT) (full text, mbox, link).


Acknowledgement sent to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. (Tue, 29 Aug 2017 12:09:03 GMT) (full text, mbox, link).


Message #15 received at submit@bugs.debian.org (full text, mbox, reply):

From: Sam Hartman <hartmans@debian.org>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: submit@bugs.debian.org, 873563@bugs.debian.org
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Tue, 29 Aug 2017 08:07:20 -0400
Ah, looked at the commit.
Yeah.
This makes sense.

This is somewhat of a behavior change.
Do we want to just bring this into unstable, or do we want to backport
it to stable releases?
It seems like there is a possibility of problems in either direction.



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 12:09:04 GMT) (full text, mbox, link).


Acknowledgement sent to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. (Tue, 29 Aug 2017 12:09:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 12:09:06 GMT) (full text, mbox, link).


Acknowledgement sent to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. (Tue, 29 Aug 2017 12:09:06 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 13:33:05 GMT) (full text, mbox, link).


Acknowledgement sent to Benjamin Kaduk <kaduk@mit.edu>:
Extra info received and forwarded to list. Copy sent to Sam Hartman <hartmans@debian.org>. (Tue, 29 Aug 2017 13:33:05 GMT) (full text, mbox, link).


Message #30 received at 873563@bugs.debian.org (full text, mbox, reply):

From: Benjamin Kaduk <kaduk@mit.edu>
To: Sam Hartman <hartmans@debian.org>
Cc: 873563@bugs.debian.org
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Tue, 29 Aug 2017 08:23:27 -0500
I am inclined to just put it in unstable and not backport, but
created the bug to see if the security team felt otherwise.

If you look at the pull request history for the upstream commit,
it seems that it was languishing there for a while before getting
merged, as well.

-Ben



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#873563; Package libgssapi-krb5-2. (Tue, 29 Aug 2017 16:45:11 GMT) (full text, mbox, link).


Acknowledgement sent to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. (Tue, 29 Aug 2017 16:45:11 GMT) (full text, mbox, link).


Message #35 received at 873563@bugs.debian.org (full text, mbox, reply):

From: Sam Hartman <hartmans@debian.org>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: 873563@bugs.debian.org
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Tue, 29 Aug 2017 12:41:07 -0400
OK, let's give the security team some context.

RFC 2744 specifies some kind of unfortunate behavior for  error
handling.

gss_init_sec_context and gss_accept_sec_context have an in/out context
parameter (pointer to pointer).
You initialize the pointed to value to null the first time through.
It gets set to some allocated context handle.
But you'll probably call gss_init_sec_context and gss_accept_sec_context
in a loop.

It gets unclear what should happen if it fails after the first time.
Are you supposed to call the free function or not?
The fact that I can 't remember how you figure out what you should do is
an indication of how obscure it is.

A lot of applications screw this up and either leak or double free
sometimes.
I'm a little confused why double free is a big deal, because I'd think
you'd end up calling gss_delete_sec_context on NULL in that case and it
could just ignore a delete of null.

Anyway, the upstream change  forces the code to follow a SHOULD in RFC
2744 and leave it up to the caller to free the context always.

The code was correct before and after this change.  However, after this
change more application code is expected to be correct.  Code that isn't
correct is likely to just leak memory.

However, this is a behavior change.  It's possible that if we bring this
back to stable we'll find it causes some theoretically broken
application to be broken in practice as well as theory.

--Sam



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 30 Aug 2017 15:09:19 GMT) (full text, mbox, link).


Set Bug forwarded-to-address to 'http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 30 Aug 2017 15:15:06 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#873563; Package libgssapi-krb5-2. (Wed, 30 Aug 2017 15:21:02 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Sam Hartman <hartmans@debian.org>. (Wed, 30 Aug 2017 15:21:03 GMT) (full text, mbox, link).


Message #44 received at 873563@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Benjamin Kaduk <kaduk@mit.edu>, 873563@bugs.debian.org
Cc: Sam Hartman <hartmans@debian.org>, Debian Security Team <team@security.debian.org>
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Wed, 30 Aug 2017 17:16:35 +0200
Hi Ben,

Thanks for the IRC ping.

On Tue, Aug 29, 2017 at 08:23:27AM -0500, Benjamin Kaduk wrote:
> I am inclined to just put it in unstable and not backport, but
> created the bug to see if the security team felt otherwise.
> 
> If you look at the pull request history for the upstream commit,
> it seems that it was languishing there for a while before getting
> merged, as well.

yes that looks fine. The issue could still be fixed via a point
release and recieve more testing before the point release beeing in
the poposed-update queue.

I will mark it for now as no-dsa in the security-tracker itself.

Regards,
Salvatore



Added tag(s) fixed-upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 30 Aug 2017 15:21:06 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Sam Hartman <hartmans@debian.org>:
Bug#873563; Package libgssapi-krb5-2. (Sat, 14 Oct 2017 07:36:02 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Sam Hartman <hartmans@debian.org>. (Sat, 14 Oct 2017 07:36:02 GMT) (full text, mbox, link).


Message #51 received at 873563@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 873563@bugs.debian.org, Benjamin Kaduk <kaduk@mit.edu>
Cc: Sam Hartman <hartmans@debian.org>
Subject: Re: Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free
Date: Sat, 14 Oct 2017 09:29:50 +0200
Hi Ben,

On Wed, Aug 30, 2017 at 05:16:35PM +0200, Salvatore Bonaccorso wrote:
> Hi Ben,
> 
> Thanks for the IRC ping.
> 
> On Tue, Aug 29, 2017 at 08:23:27AM -0500, Benjamin Kaduk wrote:
> > I am inclined to just put it in unstable and not backport, but
> > created the bug to see if the security team felt otherwise.

Any news regarding the "upload to unstable" part?

Regards,
Salvatore



Reply sent to Benjamin Kaduk <kaduk@mit.edu>:
You have taken responsibility. (Wed, 25 Oct 2017 00:39:05 GMT) (full text, mbox, link).


Notification sent to Benjamin Kaduk <kaduk@mit.edu>:
Bug acknowledged by developer. (Wed, 25 Oct 2017 00:39:05 GMT) (full text, mbox, link).


Message #56 received at 873563-close@bugs.debian.org (full text, mbox, reply):

From: Benjamin Kaduk <kaduk@mit.edu>
To: 873563-close@bugs.debian.org
Subject: Bug#873563: fixed in krb5 1.15.2-1
Date: Wed, 25 Oct 2017 00:34:34 +0000
Source: krb5
Source-Version: 1.15.2-1

We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873563@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk <kaduk@mit.edu> (supplier of updated krb5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 24 Oct 2017 17:12:31 -0500
Source: krb5
Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-kpropd krb5-multidev libkrb5-dev libkrb5-dbg krb5-pkinit krb5-otp krb5-k5tls krb5-doc libkrb5-3 libgssapi-krb5-2 libgssrpc4 libkadm5srv-mit11 libkadm5clnt-mit11 libk5crypto3 libkdb5-8 libkrb5support0 libkrad0 krb5-gss-samples krb5-locales libkrad-dev
Architecture: source amd64 all
Version: 1.15.2-1
Distribution: unstable
Urgency: medium
Maintainer: Sam Hartman <hartmans@debian.org>
Changed-By: Benjamin Kaduk <kaduk@mit.edu>
Description:
 krb5-admin-server - MIT Kerberos master server (kadmind)
 krb5-doc   - documentation for MIT Kerberos
 krb5-gss-samples - MIT Kerberos GSS Sample applications
 krb5-k5tls - TLS plugin for MIT Kerberos
 krb5-kdc   - MIT Kerberos key server (KDC)
 krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin
 krb5-kpropd - MIT Kerberos key server (Slave KDC Support)
 krb5-locales - internationalization support for MIT Kerberos
 krb5-multidev - development files for MIT Kerberos without Heimdal conflict
 krb5-otp   - OTP plugin for MIT Kerberos
 krb5-pkinit - PKINIT plugin for MIT Kerberos
 krb5-user  - basic programs to authenticate using MIT Kerberos
 libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
 libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC
 libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library
 libkadm5clnt-mit11 - MIT Kerberos runtime libraries - Administration Clients
 libkadm5srv-mit11 - MIT Kerberos runtime libraries - KDC and Admin Server
 libkdb5-8  - MIT Kerberos runtime libraries - Kerberos database
 libkrad-dev - MIT Kerberos RADIUS Library Development
 libkrad0   - MIT Kerberos runtime libraries - RADIUS library
 libkrb5-3  - MIT Kerberos runtime libraries
 libkrb5-dbg - debugging files for MIT Kerberos
 libkrb5-dev - headers and development libraries for MIT Kerberos
 libkrb5support0 - MIT Kerberos runtime libraries - Support library
Closes: 872140 873563
Changes:
 krb5 (1.15.2-1) unstable; urgency=medium
 .
   [ Sam Hartman ]
   * Fix plugins directory, thanks Andreas Hasenack, Closes: #872140
   * Move kpropd to krb5-kpropd since stretch is released
   * Mark krb5-kdc and krb5-addmin-server as multi-arch foreign
 .
   [ Benjamin Kaduk ]
   * New Upstream Version
     - Ignore files starting with '.' in profile include directories
     - Use longer timeout for HTTPS (KKDCP) transport before switching to UDP
     - Fix kadm5 setkey operations wit LDAP KDB
     - Fix CVE-2017-11462: preserve GSS context on init/accept failure,
       Closes: #873563
     - Prevent NULL dereference with keyboard master key
   * Update to policy 4.1.1:
     - Refer to service(8) instead of /etc/init.d/foo
     - Support the 'nodoc' DEB_BUILD_OPTIONS entry
     - Make all packages Priority: optional
Checksums-Sha1:
 c306625d1413916833f4c6d68d3f3e2b11f65c05 3359 krb5_1.15.2-1.dsc
 579afa73cb4a3537acd7bb8b06c5217a1006723d 9380755 krb5_1.15.2.orig.tar.gz
 93a753599c1bacbe02a9fa487e7fdf68527e2024 142448 krb5_1.15.2-1.debian.tar.xz
 c4cd53183e18a01bfdbef4a979c6d39735969205 185044 krb5-admin-server-dbgsym_1.15.2-1_amd64.deb
 66c9b8a5db1f7a07b7d8b5905c9b140acd6543f2 119168 krb5-admin-server_1.15.2-1_amd64.deb
 dcfb2049fe988c3df3dca030ddac4df6edb53f66 2269908 krb5-doc_1.15.2-1_all.deb
 203e2a5a8767575756b5d648cb622361a016985b 40300 krb5-gss-samples-dbgsym_1.15.2-1_amd64.deb
 0fcabea922e394b85c7d6c354665424d3f7e4155 60492 krb5-gss-samples_1.15.2-1_amd64.deb
 99e8d038943b3c050d19308cdab018688501f442 21088 krb5-k5tls-dbgsym_1.15.2-1_amd64.deb
 5c8e959927989367e485ae43ed00bdb57eb21437 50516 krb5-k5tls_1.15.2-1_amd64.deb
 34054aaf3e2e6a768a6574d98a7f3d138f4f5f45 473016 krb5-kdc-dbgsym_1.15.2-1_amd64.deb
 bf87c96a49d99ef21bcbfb603e351275c467b4ac 257012 krb5-kdc-ldap-dbgsym_1.15.2-1_amd64.deb
 a2818ef8f25d9602f20ad6befa0c67587fae4e7a 118812 krb5-kdc-ldap_1.15.2-1_amd64.deb
 3095f7b338a760431fc17e49fad0c1db1eba97b4 208276 krb5-kdc_1.15.2-1_amd64.deb
 cdb93586c6cbd670a310ce09e31ed2850f2a7ff1 42264 krb5-kpropd-dbgsym_1.15.2-1_amd64.deb
 98aed76bcbd1dab2885ffa5d43215b207184182d 62900 krb5-kpropd_1.15.2-1_amd64.deb
 1d40ef22c9c969a89b551f6d92f1857fe25553f0 94384 krb5-locales_1.15.2-1_all.deb
 41e0aa22490c0a54330f754dfe828f6ff9792dc5 151260 krb5-multidev_1.15.2-1_amd64.deb
 5a66650b5b96742fe195b87139c345601f398ef5 28028 krb5-otp-dbgsym_1.15.2-1_amd64.deb
 ce760fca55307c32f3afec4bfce45181258d70f3 51760 krb5-otp_1.15.2-1_amd64.deb
 4541f48505165bbc239c2a3ce608756ff6f56d81 154124 krb5-pkinit-dbgsym_1.15.2-1_amd64.deb
 a1ce56f09698d9dd3ec9c8fe6b4094baec083712 87516 krb5-pkinit_1.15.2-1_amd64.deb
 f4982f9eef01638c3cb3dcb7242e532e42c96f08 196932 krb5-user-dbgsym_1.15.2-1_amd64.deb
 613909e23cd67ad8dff3ceb5a3ae588d3cd5d392 148716 krb5-user_1.15.2-1_amd64.deb
 6aba3dad5528849e5093503683dfda80285834c6 18949 krb5_1.15.2-1_amd64.buildinfo
 d53c5cdcca52db06428ce67db62182356e18a278 155792 libgssapi-krb5-2_1.15.2-1_amd64.deb
 dd2c211e3a7c20567420bd3a12f3823364c05b09 89672 libgssrpc4_1.15.2-1_amd64.deb
 47909647ef783fe2465353540861505cc2efcee0 120584 libk5crypto3_1.15.2-1_amd64.deb
 4504acd2e20d7c14f5cbb5cd0a667c5d51c9858c 73076 libkadm5clnt-mit11_1.15.2-1_amd64.deb
 4a45a17433e354d63973fae07f5cdd189439bf81 87848 libkadm5srv-mit11_1.15.2-1_amd64.deb
 7074f575da7778a47f84b3f9738a85f0afd0ee03 72272 libkdb5-8_1.15.2-1_amd64.deb
 b775af1d66bef94066c484c2375b33d3adc16aef 46936 libkrad-dev_1.15.2-1_amd64.deb
 2173370abcdb0a6a9541155941b9f8f393024e11 56240 libkrad0_1.15.2-1_amd64.deb
 2a6d0081e14466711cbc4b27ff845b8aead78f8a 314300 libkrb5-3_1.15.2-1_amd64.deb
 f4394c750d436201f103ef02a55349b300dcd4a7 2531008 libkrb5-dbg_1.15.2-1_amd64.deb
 57516690d76e4eb9202e5c47e9c20307ffe71de9 46412 libkrb5-dev_1.15.2-1_amd64.deb
 72e015dc4220505cea692bd7c5322268bf6c6624 62792 libkrb5support0_1.15.2-1_amd64.deb
Checksums-Sha256:
 2b4ee18e9466fc5c3709deffda9ad5c35de1cf88fbfa870e9ec25798ddb9a4a9 3359 krb5_1.15.2-1.dsc
 1639e392edf25e3b6cfec2ae68f97eb53e07c2dbe74bfeede0108465d5d1c87e 9380755 krb5_1.15.2.orig.tar.gz
 a20114e2450f3f65c2b0b2dd4db528f8fc4eb6a53186a0c171fa2a7381f8adf0 142448 krb5_1.15.2-1.debian.tar.xz
 c228e7e3264fffc4e5f99ca89342c1b341a2cacb536b5bb24ac406557dcdb161 185044 krb5-admin-server-dbgsym_1.15.2-1_amd64.deb
 77f89b942fa9fc3c8cadf1daa0516a4da4c6b688995c0430c73532deca4cd355 119168 krb5-admin-server_1.15.2-1_amd64.deb
 137b9a668aa003ddbf7e73a320ac6e58bf29fb973dd05387c34182197e4311b7 2269908 krb5-doc_1.15.2-1_all.deb
 9b1940ad0b882d0b10071c21873abcb930f8584bdedcef70c2de128f10869fd4 40300 krb5-gss-samples-dbgsym_1.15.2-1_amd64.deb
 5bfa804e58b56f5cde0fbab43e3127198e52fa916827ccdb37413b0d8a9860d5 60492 krb5-gss-samples_1.15.2-1_amd64.deb
 ce9bb811c3ec7633ebe4a2ebab2803b31c7adb069574bf3b5458d308422ae39c 21088 krb5-k5tls-dbgsym_1.15.2-1_amd64.deb
 0335c4b487d89fb105b1ab24820ad6bc25c9c33360f8b21e3f475da069b4c4b7 50516 krb5-k5tls_1.15.2-1_amd64.deb
 e20989220928e7f5741ff11ca2ef7fb0dd73bfe8e0ffcdae4db9fa9178cc2bdd 473016 krb5-kdc-dbgsym_1.15.2-1_amd64.deb
 b148528340d31325af863125e30b3717dc10699824d88ab5af3ba4bca552b551 257012 krb5-kdc-ldap-dbgsym_1.15.2-1_amd64.deb
 534c7705d724bdd4b8c48ede4b87a3b1a26e023167c0bc327ca8f9596a917cd8 118812 krb5-kdc-ldap_1.15.2-1_amd64.deb
 1033584526849a37c0541c5ab836d5e9f62355a1798c93de218e2bd7167c7a2d 208276 krb5-kdc_1.15.2-1_amd64.deb
 0e13a7802fe014093f016ec858f704b4fade61cb03987d8f27d2293c4ec0636b 42264 krb5-kpropd-dbgsym_1.15.2-1_amd64.deb
 65ff8407ba03933367a088991c2cb169ca0f825fb20034a1ab5ae1cb07edfcae 62900 krb5-kpropd_1.15.2-1_amd64.deb
 4f0b5565bde3ace78678eea03063edb42d8f0547ea04b039c051600c08c22853 94384 krb5-locales_1.15.2-1_all.deb
 d3a51fc83837ea73fa3021fd7f0e98e03c9a6d1c662c9a42a580695e66f85989 151260 krb5-multidev_1.15.2-1_amd64.deb
 928321339fd72640ce598a3b71d7a7578a0157d6447250859df078a6205feb2b 28028 krb5-otp-dbgsym_1.15.2-1_amd64.deb
 c4f9967ad984df635c4344686d8617d75534f301bceef39823ee6408f5e125b7 51760 krb5-otp_1.15.2-1_amd64.deb
 78669fded9245dcc45d0781be64b2c3d88925e28d036b4552be5c175e82418b6 154124 krb5-pkinit-dbgsym_1.15.2-1_amd64.deb
 423289584df74c048700fb24669917708131e390a575b4701566f085fa3b3a18 87516 krb5-pkinit_1.15.2-1_amd64.deb
 3b7bcc2a225622bb5acf4c3a52b1084519dc4ea77532820c5f7daf458a718f57 196932 krb5-user-dbgsym_1.15.2-1_amd64.deb
 426722021dd672bbb35c6afe84e16ae9671e2e0604f4d07401d0ea14a50b56b5 148716 krb5-user_1.15.2-1_amd64.deb
 9b5d46a8f596f464cb8564be74444ed7b9bdcbc0399b0abd07ed870cd57b1031 18949 krb5_1.15.2-1_amd64.buildinfo
 9f0a955a0b87aa0a7407bf4424b0df9cd7748783c9fd24d57a0f0a3475a332c3 155792 libgssapi-krb5-2_1.15.2-1_amd64.deb
 b3021aeac5de90e1c47b714d7e14437921c0b532d6c6f3be01a0a494d53766e6 89672 libgssrpc4_1.15.2-1_amd64.deb
 3101b4a6a3e3b341fae7da4b9bce727aa80f586575b0db003e2728bd54ac9bc8 120584 libk5crypto3_1.15.2-1_amd64.deb
 4f3c0ccac160e68eaac78645e1ecbefce2214f7ce5567f8186ea50f7bf694157 73076 libkadm5clnt-mit11_1.15.2-1_amd64.deb
 9039985898bdcaa0d280ac97253c29f6769c5e9e6092b1b5f0a2c22173e76d7e 87848 libkadm5srv-mit11_1.15.2-1_amd64.deb
 cc15b30aa57506f4adf95658268c10ff5456d7ebc5eee2937bafa48ecd029899 72272 libkdb5-8_1.15.2-1_amd64.deb
 7f72c36a6546ab470d062b79ddf8cdf3ee826aea28a1c97925da313c68b7d80a 46936 libkrad-dev_1.15.2-1_amd64.deb
 86af623c5f48ec74eae9a66e21897c8363701d7f1482117005a0f94373ff5906 56240 libkrad0_1.15.2-1_amd64.deb
 2a6c0073de4f504e43e11885dada9c196b90b6707240e17848cf4d15ccb839cb 314300 libkrb5-3_1.15.2-1_amd64.deb
 bc478bfc975828c723aefece8eb69e0c1f1ce0c2ae9b191b8f077f6cf3a50c24 2531008 libkrb5-dbg_1.15.2-1_amd64.deb
 439eadff8419d30d466a836e095ab09671f5ee1ac996b847753b96503841c1b6 46412 libkrb5-dev_1.15.2-1_amd64.deb
 73ba8c980bb451e37c874b30a48e86e09b80ed2591dd29860ace7f216c953989 62792 libkrb5support0_1.15.2-1_amd64.deb
Files:
 61b718316b05fce38b15c03d3f75c8b6 3359 net optional krb5_1.15.2-1.dsc
 b160f72161c730897dc7689f876b6e2a 9380755 net optional krb5_1.15.2.orig.tar.gz
 4d688f012029e1bb16d1f38b45ff3c10 142448 net optional krb5_1.15.2-1.debian.tar.xz
 271ed4b5adcb368c2f04ddb576b5ec39 185044 debug optional krb5-admin-server-dbgsym_1.15.2-1_amd64.deb
 70a6e33babe72006c95be669c67dc16b 119168 net optional krb5-admin-server_1.15.2-1_amd64.deb
 07d5eedc8cfc4d9db1fc53ab9ce39e34 2269908 doc optional krb5-doc_1.15.2-1_all.deb
 b8f6a7b3c99f2e850bf208213981339e 40300 debug optional krb5-gss-samples-dbgsym_1.15.2-1_amd64.deb
 ca4714e41d09fdd85f536438860f4f5e 60492 net optional krb5-gss-samples_1.15.2-1_amd64.deb
 6b39e2c68897ae6eb538dbff2337f70d 21088 debug optional krb5-k5tls-dbgsym_1.15.2-1_amd64.deb
 c6717f698ab27c850995d6a7929d8bac 50516 net optional krb5-k5tls_1.15.2-1_amd64.deb
 01b2a71523b43d6b2350d254dddb5f8f 473016 debug optional krb5-kdc-dbgsym_1.15.2-1_amd64.deb
 023e1aa7335d2e9a2252f51e59faa2b8 257012 debug optional krb5-kdc-ldap-dbgsym_1.15.2-1_amd64.deb
 66631a0a0f5d2a678577c33f847ead4f 118812 net optional krb5-kdc-ldap_1.15.2-1_amd64.deb
 01a3661f458888e8edd2459a5f0eeb93 208276 net optional krb5-kdc_1.15.2-1_amd64.deb
 be2985aa977e954bd03b7ad71be13c7c 42264 debug optional krb5-kpropd-dbgsym_1.15.2-1_amd64.deb
 990de08ff3297ba39d98a96756eb11a1 62900 net optional krb5-kpropd_1.15.2-1_amd64.deb
 b4a355f9f6a33ad5d288e7c028709b7a 94384 localization optional krb5-locales_1.15.2-1_all.deb
 b159668f9a3b4ead5cb163baaad970a8 151260 libdevel optional krb5-multidev_1.15.2-1_amd64.deb
 87a520169902e5f30f13d0c50d5745c5 28028 debug optional krb5-otp-dbgsym_1.15.2-1_amd64.deb
 5679d1e8dfde63a52f78be3a16ec3a3d 51760 net optional krb5-otp_1.15.2-1_amd64.deb
 19409f262ba3bb9a6bd246d40b40031a 154124 debug optional krb5-pkinit-dbgsym_1.15.2-1_amd64.deb
 5bd89bca1eca26af4b065b23eec8ac20 87516 net optional krb5-pkinit_1.15.2-1_amd64.deb
 a86b229ea220aba59f560312d2ddb11c 196932 debug optional krb5-user-dbgsym_1.15.2-1_amd64.deb
 fc8cbfecd83d2cfd2e67875970fd6d16 148716 net optional krb5-user_1.15.2-1_amd64.deb
 fa15001a818c0cedcb4c03c3fd02837f 18949 net optional krb5_1.15.2-1_amd64.buildinfo
 cc9af87dd67ff56de7302c639ba5f3d2 155792 libs optional libgssapi-krb5-2_1.15.2-1_amd64.deb
 da1b7a5aea687667a11079005d0d397c 89672 libs optional libgssrpc4_1.15.2-1_amd64.deb
 fc56c3cdf1cac59c58db2f57d03a065b 120584 libs optional libk5crypto3_1.15.2-1_amd64.deb
 ba0af928c3dc625a654f5f7b333cc151 73076 libs optional libkadm5clnt-mit11_1.15.2-1_amd64.deb
 829624c66111288b1e48bc54c7a25c57 87848 libs optional libkadm5srv-mit11_1.15.2-1_amd64.deb
 0877bd97fa93ab740e5c1e22e0e78c8c 72272 libs optional libkdb5-8_1.15.2-1_amd64.deb
 15a4f611b03527e33807f28c0de5593d 46936 libdevel optional libkrad-dev_1.15.2-1_amd64.deb
 5cb7e521315d099981edf0e16ec15ba8 56240 libs optional libkrad0_1.15.2-1_amd64.deb
 e7fa2763ffde90d4bc8ad7e35d09b8db 314300 libs optional libkrb5-3_1.15.2-1_amd64.deb
 04d0eae5ece9a4acccd96159c191383d 2531008 debug optional libkrb5-dbg_1.15.2-1_amd64.deb
 9fc8fa74203c14a94f1174fe742474de 46412 libdevel optional libkrb5-dev_1.15.2-1_amd64.deb
 53b0884c0fe8ca09352927ac7e3ffbbc 62792 libs optional libkrb5support0_1.15.2-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=URUE
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 23 Nov 2017 07:28:51 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:24:17 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.