krb5-workstation-1.6.1-80.el5_11.x86_64
[918 KiB] |
Changelog
by Nalin Dahyabhai (2014-08-28):
- rebuild
|
krb5-workstation-1.6.1-78.el5.x86_64
[918 KiB] |
Changelog
by Nalin Dahyabhai (2014-07-28):
- gssapi: pull in upstream fix for a possible NULL dereference in spnego
(CVE-2014-4344, #1121509)
|
krb5-workstation-1.6.1-71.el5_10.1.x86_64
[917 KiB] |
Changelog
by Nalin Dahyabhai (2014-05-05):
- add patch based on one from Filip Krska to not call poll() with a negative
timeout when the caller's intent is for us to just stop calling it (#1089732)
|
krb5-workstation-1.6.1-70.el5_9.2.x86_64
[917 KiB] |
Changelog
by Nalin Dahyabhai (2013-06-05):
- rebuild, correcting changelog version/release identifiers
|
krb5-workstation-1.6.1-70.el5.x86_64
[917 KiB] |
Changelog
by Nalin Dahyabhai (2011-12-27):
- add upstream patch for telnetd buffer overflow (CVE-2011-4862, #770351)
|
krb5-workstation-1.6.1-63.el5_7.x86_64
[915 KiB] |
Changelog
by Huzaifa Sidhpurwala (2011-12-27):
- Fix for CVE-2011-4862
|
krb5-workstation-1.6.1-62.el5.x86_64
[846 KiB] |
Changelog
by Nalin Dahyabhai (2011-06-17):
- incorporate a fix to teach the file labeling bits about when replay caches
are expunged (#712453)
|
krb5-workstation-1.6.1-55.el5_6.2.x86_64
[914 KiB] |
Changelog
by Nalin Dahyabhai (2011-06-18):
- incorporate a fix to teach the file labeling bits about when replay caches
are expunged (#714188)
|
krb5-workstation-1.6.1-55.el5_6.1.x86_64
[845 KiB] |
Changelog
by Nalin Dahyabhai (2011-01-20):
- add upstream patch to fix hang or crash in the KDC when using the LDAP kdb
backend (CVE-2011-0281, CVE-2011-0282, #671096)
|
krb5-workstation-1.6.1-55.el5.x86_64
[844 KiB] |
Changelog
by Nalin Dahyabhai (2010-11-30):
- incorporate upstream patch for checksum acceptance issues from
MITKRB5-SA-2010-007 (CVE-2010-1323, #652308)
|
krb5-workstation-1.6.1-36.el5_5.6.x86_64
[842 KiB] |
Changelog
by Nalin Dahyabhai (2010-11-12):
- incorporate candidate patch for checksum acceptance issues from
MITKRB5-SA-2010-007 (CVE-2010-1323, #652307)
|
krb5-workstation-1.6.1-36.el5_5.5.x86_64
[911 KiB] |
Changelog
by Nalin Dahyabhai (2010-07-17):
- ksu: perform PAM account and session management before dropping privileges
to those of the target user (#602967, #615261)
|
krb5-workstation-1.6.1-36.el5_5.4.x86_64
[842 KiB] |
Changelog
by Nalin Dahyabhai (2010-05-04):
- add candidate patch to correct KDC null pointer dereference which
could be triggered by malformed client requests (CVE-2010-1321, #583703)
|
krb5-workstation-1.6.1-36.el5_5.2.x86_64
[842 KiB] |
Changelog
by Nalin Dahyabhai (2010-03-30):
- add upstream patch to fix a few use-after-free bugs, including one in
kadmind (CVE-2010-0629, #578185)
|
krb5-workstation-1.6.1-36.el5_4.1.x86_64
[841 KiB] |
Changelog
by Nalin Dahyabhai (2009-12-10):
- add candidate patch to correct KDC integer overflows which could be
triggered by malformed RC4 and AES ciphertexts (CVE-2009-4212, #546347)
|
krb5-workstation-1.6.1-36.el5.x86_64
[841 KiB] |
Changelog
by Nalin Dahyabhai (2009-05-19):
- add an auth stack to ksu's PAM configuration so that it can successfully
pam_setcred()
|
krb5-workstation-1.6.1-31.el5_3.3.x86_64
[900 KiB] |
Changelog
by Nalin Dahyabhai (2009-04-04):
- update to revised patch for CVE-2009-0844/CVE-2009-0845
|
krb5-workstation-1.6.1-31.el5.x86_64
[841 KiB] |
Changelog
by Nalin Dahyabhai (2008-11-25):
- add a backported patch which adds a check on credentials obtained from
a foreign realm to make sure that they're of an acceptable type, and
if not, retry to the request to get one of the right type (Sadique Puthen,
|
krb5-workstation-1.6.1-25.el5_2.2.x86_64
[837 KiB] |
Changelog
by Nalin Dahyabhai (2008-12-03):
- add a backported patch which adds a check on credentials obtained from
the KDC to make sure that they're of an acceptable type, and if not, retry to
the request to get one of the right type (Sadique Puthen, #473104)
|
krb5-workstation-1.6.1-25.el5_2.1.x86_64
[900 KiB] |
Changelog
by Nalin Dahyabhai (2008-09-12):
- backport fix from 1.6.3 to abort a sequential scan of a keytab if the
handle to the keytab has become invalidated during the scan (via Vince
Worthington, #461908)
|