nfs_des
021_debian
022_openafs
025_krb5-config-paths
025_pthreads
030_pkg-config-paths
installsh
041_hurd_maxhostnamelen
042_hurd_path_max
046_hurd_sundevdata
047_link_gssapi
060_no_build_string
parallel-build
disable_iprop
canonical_host
0016-Add-back-in-base64_encode-and-base64_decode.patch
fix-missing-headers
0017-CVE-2018-16860-Heimdal-KDC-Reject-PA-S4U2Self-with-u.patch
0018-CVE-2019-12098-krb5-always-confirm-PA-PKINIT-KX-for-.patch
0020-Fixes-https-github.com-heimdal-heimdal-issues-533.patch
0021-Regenerate-certs-so-that-they-expire-before-the-2038.patch
0022-CVE-2019-14870-kdc-Always-lookup-impersonate-client-.patch
0023-CVE-2019-14870-kdc-Apply-forwardable-policy-in-proto.patch
0024-CVE-2019-14870-kdc-Validate-client-attributes-in-pro.patch
0025-CVE-2021-3671-kdc-validate-sname-in-TGS-REQ.patch
0026-CVE-2021-44758-spnego-send_reject-when-no-mech-selec.patch
0027-gss-Remove-useless-grep-from-check-context.patch
0028-CVE-2022-3437-gsskrb5-Use-constant-time-memcmp-for-a.patch
0029-CVE-2022-3437-gsskrb5-Use-constant-time-memcmp-in-un.patch
0030-CVE-2022-3437-gsskrb5-Don-t-pass-NULL-pointers-to-me.patch
0031-CVE-2022-3437-gsskrb5-Avoid-undefined-behaviour-in-_.patch
0032-CVE-2022-3437-gsskrb5-Check-the-result-of-_gsskrb5_g.patch
0033-CVE-2022-3437-gsskrb5-Check-buffer-length-against-ov.patch
0034-CVE-2022-3437-gsskrb5-Check-for-overflow-in-_gsskrb5.patch
0035-CVE-2022-3437-gsskrb5-Pass-correct-length-to-_gssapi.patch
0036-CVE-2022-41916-lib-wind-find_normalize-read-past-end-of-array.patch
0037-CVE-2022-42898-krb5-PAC-parse-integer-overflows.patch
0038-lib-krb5-fix-_krb5_get_int64-on-32-bit-systems.patch
0039-lib-krb5-krb5_pac_parse-mem-leak-if-pac_header_size-.patch
0040-kdc-Check-generate_pac-return-code.patch
0041-CVE-2022-44640-asn1-Invalid-free-in-ASN.1-codec.patch
CVE-2022-45142.patch
