It was discovered that Kerberos incorrectly handled memory when processing KDC data, which could lead to a NULL pointer dereference. An attacker could possibly use this issue to cause a denial of service or have other unspecified impacts. (CVE-2021-36222, CVE-2021-37750)
{
"binaries": [
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-admin-server"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-gss-samples"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-k5tls"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-kdc"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-kdc-ldap"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-kpropd"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-locales"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-multidev"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-otp"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-pkinit"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "krb5-user"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libgssapi-krb5-2"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libgssrpc4"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libk5crypto3"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkadm5clnt-mit11"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkadm5srv-mit11"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkdb5-9"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkrad-dev"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkrad0"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkrb5-3"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkrb5-dev"
},
{
"binary_version": "1.16-2ubuntu0.4",
"binary_name": "libkrb5support0"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2021-36222"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2021-37750"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"binaries": [
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-admin-server"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-gss-samples"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-k5tls"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-kdc"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-kdc-ldap"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-kpropd"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-locales"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-multidev"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-otp"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-pkinit"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "krb5-user"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libgssapi-krb5-2"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libgssrpc4"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libk5crypto3"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkadm5clnt-mit11"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkadm5srv-mit11"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkdb5-9"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkrad-dev"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkrad0"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkrb5-3"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkrb5-dev"
},
{
"binary_version": "1.17-6ubuntu4.3",
"binary_name": "libkrb5support0"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2021-36222"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2021-37750"
}
],
"ecosystem": "Ubuntu:20.04:LTS"
}