vulnerability
Rocky Linux: CVE-2021-36222: krb5 (RLSA-2021-3576)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jul 22, 2021 | Mar 12, 2024 | Aug 13, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 22, 2021
Added
Mar 12, 2024
Modified
Aug 13, 2025
Description
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
Solutions
rocky-upgrade-krb5-debuginforocky-upgrade-krb5-debugsourcerocky-upgrade-krb5-develrocky-upgrade-krb5-devel-debuginforocky-upgrade-krb5-libsrocky-upgrade-krb5-libs-debuginforocky-upgrade-krb5-pkinitrocky-upgrade-krb5-pkinit-debuginforocky-upgrade-krb5-serverrocky-upgrade-krb5-server-debuginforocky-upgrade-krb5-server-ldaprocky-upgrade-krb5-server-ldap-debuginforocky-upgrade-krb5-workstationrocky-upgrade-krb5-workstation-debuginforocky-upgrade-libkadm5rocky-upgrade-libkadm5-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.