Security Fix(es):
In MIT krb5 releases 1.16 and later, an unauthenticated attacker can cause a null dereference in the KDC by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST.(CVE-2021-36222)
{ "severity": "High" }
{ "src": [ "krb5-1.18.2-4.oe1.src.rpm" ], "x86_64": [ "krb5-1.18.2-4.oe1.x86_64.rpm", "krb5-devel-1.18.2-4.oe1.x86_64.rpm", "krb5-debuginfo-1.18.2-4.oe1.x86_64.rpm", "krb5-libs-1.18.2-4.oe1.x86_64.rpm", "krb5-debugsource-1.18.2-4.oe1.x86_64.rpm", "krb5-client-1.18.2-4.oe1.x86_64.rpm", "krb5-server-1.18.2-4.oe1.x86_64.rpm" ], "aarch64": [ "krb5-debuginfo-1.18.2-4.oe1.aarch64.rpm", "krb5-libs-1.18.2-4.oe1.aarch64.rpm", "krb5-server-1.18.2-4.oe1.aarch64.rpm", "krb5-1.18.2-4.oe1.aarch64.rpm", "krb5-debugsource-1.18.2-4.oe1.aarch64.rpm", "krb5-client-1.18.2-4.oe1.aarch64.rpm", "krb5-devel-1.18.2-4.oe1.aarch64.rpm" ], "noarch": [ "krb5-help-1.18.2-4.oe1.noarch.rpm" ] }
{ "src": [ "krb5-1.18.2-4.oe1.src.rpm" ], "x86_64": [ "krb5-debuginfo-1.18.2-4.oe1.x86_64.rpm", "krb5-server-1.18.2-4.oe1.x86_64.rpm", "krb5-debugsource-1.18.2-4.oe1.x86_64.rpm", "krb5-1.18.2-4.oe1.x86_64.rpm", "krb5-libs-1.18.2-4.oe1.x86_64.rpm", "krb5-devel-1.18.2-4.oe1.x86_64.rpm", "krb5-client-1.18.2-4.oe1.x86_64.rpm" ], "aarch64": [ "krb5-debugsource-1.18.2-4.oe1.aarch64.rpm", "krb5-client-1.18.2-4.oe1.aarch64.rpm", "krb5-devel-1.18.2-4.oe1.aarch64.rpm", "krb5-libs-1.18.2-4.oe1.aarch64.rpm", "krb5-server-1.18.2-4.oe1.aarch64.rpm", "krb5-1.18.2-4.oe1.aarch64.rpm", "krb5-debuginfo-1.18.2-4.oe1.aarch64.rpm" ], "noarch": [ "krb5-help-1.18.2-4.oe1.noarch.rpm" ] }