Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-s8nw-22gx-6kbk
Summarykrb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
Aliases
0
alias CVE-2024-26458
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/krb5@1.18.2-27?arch=el8_10
purl pkg:rpm/redhat/krb5@1.18.2-27?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6uzj-3k5v-v7ds
1
vulnerability VCID-s8nw-22gx-6kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.18.2-27%3Farch=el8_10
1
url pkg:rpm/redhat/krb5@1.21.1-3?arch=el9
purl pkg:rpm/redhat/krb5@1.21.1-3?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6uzj-3k5v-v7ds
1
vulnerability VCID-e827-j3gv-hkau
2
vulnerability VCID-s8nw-22gx-6kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.21.1-3%3Farch=el9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26458.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26458
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-26T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48245
published_at 2026-04-13T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48297
published_at 2026-04-16T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48291
published_at 2026-04-18T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48246
published_at 2026-04-21T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48232
published_at 2026-04-24T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48214
published_at 2026-04-02T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48234
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-07T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48241
published_at 2026-04-08T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48235
published_at 2026-04-09T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.4826
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098754
reference_id 1098754
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098754
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2266731
reference_id 2266731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2266731
6
reference_url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
reference_id krb5_detect_1.md
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-29T20:47:58Z/
url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
7
reference_url https://security.netapp.com/advisory/ntap-20240415-0010/
reference_id ntap-20240415-0010
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-29T20:47:58Z/
url https://security.netapp.com/advisory/ntap-20240415-0010/
8
reference_url https://access.redhat.com/errata/RHSA-2024:3268
reference_id RHSA-2024:3268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3268
9
reference_url https://access.redhat.com/errata/RHSA-2024:9331
reference_id RHSA-2024:9331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9331
10
reference_url https://usn.ubuntu.com/7314-1/
reference_id USN-7314-1
reference_type
scores
url https://usn.ubuntu.com/7314-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_score5.3 - 7.5
Exploitability0.5
Weighted_severity5.3
Risk_score2.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-s8nw-22gx-6kbk