Security Fix(es):
In MIT krb5 releases 1.16 and later, an unauthenticated attacker can cause a null dereference in the KDC by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST.(CVE-2021-36222)
{
"severity": "High"
}{
"x86_64": [
"krb5-1.18.2-4.oe1.x86_64.rpm",
"krb5-devel-1.18.2-4.oe1.x86_64.rpm",
"krb5-debuginfo-1.18.2-4.oe1.x86_64.rpm",
"krb5-libs-1.18.2-4.oe1.x86_64.rpm",
"krb5-debugsource-1.18.2-4.oe1.x86_64.rpm",
"krb5-client-1.18.2-4.oe1.x86_64.rpm",
"krb5-server-1.18.2-4.oe1.x86_64.rpm"
],
"aarch64": [
"krb5-debuginfo-1.18.2-4.oe1.aarch64.rpm",
"krb5-libs-1.18.2-4.oe1.aarch64.rpm",
"krb5-server-1.18.2-4.oe1.aarch64.rpm",
"krb5-1.18.2-4.oe1.aarch64.rpm",
"krb5-debugsource-1.18.2-4.oe1.aarch64.rpm",
"krb5-client-1.18.2-4.oe1.aarch64.rpm",
"krb5-devel-1.18.2-4.oe1.aarch64.rpm"
],
"src": [
"krb5-1.18.2-4.oe1.src.rpm"
],
"noarch": [
"krb5-help-1.18.2-4.oe1.noarch.rpm"
]
}
{
"x86_64": [
"krb5-debuginfo-1.18.2-4.oe1.x86_64.rpm",
"krb5-server-1.18.2-4.oe1.x86_64.rpm",
"krb5-debugsource-1.18.2-4.oe1.x86_64.rpm",
"krb5-1.18.2-4.oe1.x86_64.rpm",
"krb5-libs-1.18.2-4.oe1.x86_64.rpm",
"krb5-devel-1.18.2-4.oe1.x86_64.rpm",
"krb5-client-1.18.2-4.oe1.x86_64.rpm"
],
"aarch64": [
"krb5-debugsource-1.18.2-4.oe1.aarch64.rpm",
"krb5-client-1.18.2-4.oe1.aarch64.rpm",
"krb5-devel-1.18.2-4.oe1.aarch64.rpm",
"krb5-libs-1.18.2-4.oe1.aarch64.rpm",
"krb5-server-1.18.2-4.oe1.aarch64.rpm",
"krb5-1.18.2-4.oe1.aarch64.rpm",
"krb5-debuginfo-1.18.2-4.oe1.aarch64.rpm"
],
"src": [
"krb5-1.18.2-4.oe1.src.rpm"
],
"noarch": [
"krb5-help-1.18.2-4.oe1.noarch.rpm"
]
}