In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.Referenceshttps://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final