samba is vulnerable to denial of service (DoS) attacks. The library fails to guard against integer overflows when parsing a PAC on a 32-bit system, which allows an attacker with a forged PAC to corrupt the heap.
bugzilla.samba.org/show_bug.cgi?id=15203
github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
security-tracker.debian.org/tracker/CVE-2022-42898
security.gentoo.org/glsa/202309-06
security.gentoo.org/glsa/202310-06
security.netapp.com/advisory/ntap-20230216-0008/
security.netapp.com/advisory/ntap-20230223-0001/
web.mit.edu/kerberos/advisories/
web.mit.edu/kerberos/krb5-1.19/
web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
www.samba.org/samba/security/CVE-2022-42898.html