It was discovered that Kerberos incorrectly handled memory when processing KDC data, which could lead to a NULL pointer dereference. An attacker could possibly use this issue to cause a denial of service or have other unspecified impacts. (CVE-2021-36222, CVE-2021-37750)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "krb5-admin-server",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-gss-samples",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-k5tls",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-kdc",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-kdc-ldap",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-kpropd",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-locales",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-multidev",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-otp",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-pkinit",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "krb5-user",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libgssapi-krb5-2",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libgssrpc4",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libk5crypto3",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkadm5clnt-mit11",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkadm5srv-mit11",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkdb5-9",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkrad-dev",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkrad0",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkrb5-3",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkrb5-dev",
"binary_version": "1.16-2ubuntu0.4"
},
{
"binary_name": "libkrb5support0",
"binary_version": "1.16-2ubuntu0.4"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2021-36222",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2021-37750",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "krb5-admin-server",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-gss-samples",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-k5tls",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-kdc",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-kdc-ldap",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-kpropd",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-locales",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-multidev",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-otp",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-pkinit",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "krb5-user",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libgssapi-krb5-2",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libgssrpc4",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libk5crypto3",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkadm5clnt-mit11",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkadm5srv-mit11",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkdb5-9",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkrad-dev",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkrad0",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkrb5-3",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkrb5-dev",
"binary_version": "1.17-6ubuntu4.3"
},
{
"binary_name": "libkrb5support0",
"binary_version": "1.17-6ubuntu4.3"
}
]
}
{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2021-36222",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2021-37750",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
]
}