Hide Forgot
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field. The attacker needs to be successfully authenticated in order to carry on the attack. Reference and upstream patch: https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
Created krb5 tracking bugs for this issue: Affects: fedora-all [bug 1996835]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3576 https://access.redhat.com/errata/RHSA-2021:3576
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-37750
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:4788 https://access.redhat.com/errata/RHSA-2021:4788