Bug 1472956 - Add support to query the SSF of a context
Add support to query the SSF of a context
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: krb5 (Show other bugs)
7.5
Unspecified Unspecified
medium Severity unspecified
: rc
: ---
Assigned To: Robbie Harwood
Patrik Kis
https://github.com/krb5/krb5/pull/625
:
Depends On:
Blocks: rhel75-cyrus-sasl-kerberos
  Show dependency treegraph
 
Reported: 2017-07-19 12:34 EDT by Simo Sorce
Modified: 2018-04-10 04:42 EDT (History)
4 users (show)

See Also:
Fixed In Version: krb5-1.15.1-10.el7
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-04-10 04:41:43 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0666 None None None 2018-04-10 04:42 EDT

  None (edit)
Description Simo Sorce 2017-07-19 12:34:21 EDT
We added support upstream to query the SSF from a krb5 context in this PR[1]

This work was needed to provide information to the SASL framework for which we have a bug[2].

Upstream SASL has accepted patches so we need to backport this feature to make use of it.

[1]https://github.com/krb5/krb5/pull/625
[2]https://bugzilla.redhat.com/show_bug.cgi?id=1431586
Comment 2 Robbie Harwood 2017-07-19 14:42:16 EDT
This change has been made to fedora >= krb5-1.15.1-15.fc26 .
Comment 10 errata-xmlrpc 2018-04-10 04:41:43 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2018:0666

Note You need to log in before you can comment on or make changes to this bug.