File: series

package info (click to toggle)
krb5 1.12.1+dfsg-19+deb8u4
  • links: PTS, VCS
  • area: main
  • in suites: jessie
  • size: 67,680 kB
  • ctags: 34,155
  • sloc: ansic: 309,213; cpp: 15,753; exp: 13,257; makefile: 7,652; python: 7,228; sh: 6,457; perl: 3,514; asm: 1,544; yacc: 1,187; awk: 396; xml: 368; csh: 147; lisp: 104; sed: 43
file content (43 lines) | stat: -rw-r--r-- 2,406 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
0001-ticket-new.patch
debian-local/0002-Debian-HURD-compatibility.patch
debian-local/0003-debian-suppress-usr-lib-in-krb5-config.patch
debian-local/0004-debian-osconf.hin-path-changes.patch
debian-local/0005-debian-install-ldap-library-in-subdirectory.patch
debian-local/0006-gssapi-never-unload-mechanisms.patch
debian-local/0007-Add-substpdf-target.patch
upstream/0008-Move-OTP-sockets-to-KDC_RUN_DIR.patch
upstream/0009-Avoid-duplicate-etc-krb5.conf-in-profile-path.patch
0010-autoreconf.patch
upstream/0011-Load-mechglue-config-files-from-etc-gss-mech.d.patch
0012-Read-etc-gss-mech-when-no-files-in-mech.d.patch
0013-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
0014-Handle-invalid-RFC-1964-tokens-CVE-2014-4341.patch
upstream/0015-Fix-double-free-in-SPNEGO-CVE-2014-4343.patch
upstream/0016-Fix-null-deref-in-SPNEGO-acceptor-CVE-2014-4344.patch
upstream/0017-Use-TAILQ-macros-instead-of-CIRCLEQ-in-libdb2.patch
debian-local/0018-Quick-and-dirty-fix-to-building-O3.patch
upstream/0019-Fix-LDAP-key-data-segmentation-CVE-2014-4345.patch
0020-Treat-krb.hin-as-a-C-file-for-doxygen.patch
debian-local/0021-Fix-pkg-config-library-include-paths.patch
debian-local/0022-Fix-krb5-config-paths.patch
debian-local/0023-Use-isystem-for-include-paths.patch
upstream/0024-Return-only-new-keys-in-randkey-CVE-2014-5351.patch
upstream/0025-Fix-build-on-systems-without-RTM_OLD.patch
upstream/0026-Remove-rtm_type_name.patch
upstream/0027-Fix-LDAP-misused-policy-name-crash-CVE-2014-5353.patch
0028-Support-keyless-principals-in-LDAP-CVE-2014-5354.patch
upstream/0029-MITKRB5-SA-2015-0001.patch
upstream/0030-Fix-krb5_read_message-handling-CVE-2014-5355.patch
upstream/0031-Fix-SPNEGO-context-aliasing-bugs-CVE-2015-2695.patch
upstream/0032-Fix-IAKERB-context-aliasing-bugs-CVE-2015-2696.patch
upstream/0033-Fix-build_principal-memory-bug-CVE-2015-2697.patch
upstream/0034-Fix-two-IAKERB-comments.patch
upstream/0035-Fix-IAKERB-context-export-import-CVE-2015-2698.patch
upstream/0036-Fix-SPNEGO-context-import.patch
upstream/0037-Verify-decoded-kadmin-C-strings-CVE-2015-8629.patch
upstream/0038-Check-for-null-kadm5-policy-name-CVE-2015-8630.patch
upstream/0039-Fix-leaks-in-kadmin-server-stubs-CVE-2015-8631.patch
prevent-requires_preauth-bypass-cve-2015.patch
fix-s4u2self-kdc-crash-when-anon-is-rest.patch
fix-ldap-null-deref-on-empty-arg-cve-201.patch
prevent-kdc-unset-status-assertion-failu.patch