krb5 is vulnerable to denial of service. The vulnerability exists due to a NULL pointer dereference via a FAST inner body that lacks a server field.
access.redhat.com/errata/RHSA-2021:4788
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1996834
github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
github.com/krb5/krb5/releases
lists.debian.org/debian-lts-announce/2021/09/msg00019.html
lists.fedoraproject.org/archives/list/[email protected]/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
security.netapp.com/advisory/ntap-20210923-0002/
web.mit.edu/kerberos/advisories/
www.oracle.com/security-alerts/cpujul2022.html
www.starwindsoftware.com/security/sw-20220817-0004/