df6d78c9f1
This is a bugfix release. The krb5-1.10 release series is in maintenance, and for new deployments, installers should prefer the krb5-1.11 release series or later. * Fix KDC null pointer dereference in TGS-REQ handling [CVE-2013-1416] * Incremental propagation could erroneously act as if a slave's database were current after the slave received a full dump that failed to load.
23 lines
1.3 KiB
Text
23 lines
1.3 KiB
Text
$NetBSD: distinfo,v 1.42 2013/05/09 08:40:05 adam Exp $
|
|
|
|
SHA1 (krb5-1.10.5-signed.tar) = 5c94637ee2355dc0e032abadec4ad207d0f04022
|
|
RMD160 (krb5-1.10.5-signed.tar) = 4800d2da6cf68dacf3e116a29f443010220f3237
|
|
Size (krb5-1.10.5-signed.tar) = 11632640 bytes
|
|
SHA1 (patch-aa) = 941848a1773dfbe51dff3134d4b8504a850a958d
|
|
SHA1 (patch-ad) = b56a7218007560470179dd811c84b8c690c966ac
|
|
SHA1 (patch-ae) = c7395b9de5baf6612b8787fad55dbc051a680bfd
|
|
SHA1 (patch-af) = 1edab3a5f7eb6a7c5dc287e94ae4401c389dbabf
|
|
SHA1 (patch-ag) = 48c0ce35324f5757134c1c5da666bb0cb7a3aaa6
|
|
SHA1 (patch-ah) = 4e40f36e8969974b3c2f68b2e3636921133c57ba
|
|
SHA1 (patch-aj) = 8a00ca30db3c9c3c9a2f7506cdc4c5b20f7f42c6
|
|
SHA1 (patch-ak) = 19d9b15048a5920ee15c82b33da50c40cf400e46
|
|
SHA1 (patch-al) = 7445639b82eadf9b1feb1448c1654fa6ddc937aa
|
|
SHA1 (patch-cf) = 806b089d3b12ea9a17c6caab59cbdeb6ec17bbc3
|
|
SHA1 (patch-cg) = 30b1e8943b0cbe67f37bac6883f4bdd82776e6d1
|
|
SHA1 (patch-ch) = 0f7f45aeb52907b52a2b143c3a2e36a7656c68c5
|
|
SHA1 (patch-ci) = 4e310f0a4dfe27cf94d0e63d623590691b6c5970
|
|
SHA1 (patch-cj) = 78342f649f8e9d3a3b5a4f83e65b6c46f589586b
|
|
SHA1 (patch-ck) = 37bfef80329f8ae0fb35c35e70032a0040ba5591
|
|
SHA1 (patch-kadmin_dbutil_dump.c) = 4b49c116dbed9e6be4a0bf0a731c3ae82808d82e
|
|
SHA1 (patch-lib_krb5_asn.1_asn1buf.h) = a1e46ca9256aea4facc1d41841b1707b044a69e7
|
|
SHA1 (patch-util_k5ev_verto-k5ev.c) = 79a2be64fa4f9b0dc3a333271e8a3ff7944e5c18
|