First published: Mon Feb 26 2024(Updated: )
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | <=1.18.3-6+deb11u5<=1.18.3-6+deb11u6<=1.20.1-2+deb12u2<=1.21.3-4 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26461 is classified as a medium severity vulnerability due to its potential impact on system performance through memory leaks.
To fix CVE-2024-26461, upgrade to a version of Kerberos 5 that is higher than 1.21.2.
CVE-2024-26461 affects IBM Storage Defender - Resiliency Service versions 2.0.0 to 2.0.9.
The memory leak in CVE-2024-26461 is caused by improper handling of memory in the k5sealv3.c file in Kerberos 5.
CVE-2024-26461 is not a remote vulnerability, but it can affect applications utilizing the vulnerable Kerberos library.