A vulnerability was found in the _xdr_kadm5_principal_ent_rec() function in lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (krb5). This issue occurs due to lack of validation in the relationship between n_key_data and the key_data array count, leading to the freeing of uninitialized pointers. This may allow a remote authenticated attacker to send a specially crafted request that causes the kadmind process to crash, resulting in a denial of service (DoS).
bugzilla.redhat.com/show_bug.cgi?id=2230178
github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
nvd.nist.gov/vuln/detail/CVE-2023-36054
web.mit.edu/kerberos/www/advisories/
www.cve.org/CVERecord?id=CVE-2023-36054