File _patchinfo of Package patchinfo.20988

<patchinfo incident="20988">
  <issue tracker="bnc" id="1189929">VUL-0: CVE-2021-37750: krb5: krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks a server field</issue>
  <issue tracker="bnc" id="1205126">VUL-0: EMBARGOED:  CVE-2022-42898: samba: heimdal: Samba buffer overflow vulnerabilities on 32-bit systems</issue>
  <issue tracker="cve" id="2021-37750"/>
  <issue tracker="cve" id="2022-42898"/>
  <packager>scabrero</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for krb5</summary>
  <description>This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).
- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
</description>
</patchinfo>
openSUSE Build Service is sponsored by