Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e827-j3gv-hkau
Summarykrb5: Memory leak at /krb5/src/kdc/ndr.c
Aliases
0
alias CVE-2024-26462
Fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.21.3-1?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie
5
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
6
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/krb5@1.21.1-3?arch=el9
purl pkg:rpm/redhat/krb5@1.21.1-3?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6uzj-3k5v-v7ds
1
vulnerability VCID-e827-j3gv-hkau
2
vulnerability VCID-s8nw-22gx-6kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/krb5@1.21.1-3%3Farch=el9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26462
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06725
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06656
published_at 2026-04-12T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06648
published_at 2026-04-13T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06577
published_at 2026-04-16T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06569
published_at 2026-04-18T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06726
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06558
published_at 2026-04-02T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06595
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06578
published_at 2026-04-07T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06629
published_at 2026-04-08T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06672
published_at 2026-04-09T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06664
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26462
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965
reference_id 1064965
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2266742
reference_id 2266742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2266742
5
reference_url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
reference_id krb5_detect_3.md
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/
url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
6
reference_url https://security.netapp.com/advisory/ntap-20240415-0012/
reference_id ntap-20240415-0012
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/
url https://security.netapp.com/advisory/ntap-20240415-0012/
7
reference_url https://access.redhat.com/errata/RHSA-2024:9331
reference_id RHSA-2024:9331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9331
8
reference_url https://usn.ubuntu.com/7314-1/
reference_id USN-7314-1
reference_type
scores
url https://usn.ubuntu.com/7314-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_score5.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e827-j3gv-hkau