Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mit
Mit kerberos 5 Netapp Netapp active Iq Unified Manager Netapp cloud Volumes Ontap Mediator Netapp h610c Netapp h610c Firmware Netapp h610s Netapp h610s Firmware Netapp h615c Netapp h615c Firmware Netapp management Services For Element Software And Netapp Hci Netapp ontap 9 Netapp ontap Select Deploy Administration Utility |
|
CPEs | cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Mit
Mit kerberos 5 Netapp Netapp active Iq Unified Manager Netapp cloud Volumes Ontap Mediator Netapp h610c Netapp h610c Firmware Netapp h610s Netapp h610s Firmware Netapp h615c Netapp h615c Firmware Netapp management Services For Element Software And Netapp Hci Netapp ontap 9 Netapp ontap Select Deploy Administration Utility |
Fri, 06 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |

Status: PUBLISHED
Assigner: mitre
Published: 2024-02-26T00:00:00
Updated: 2024-12-06T21:01:53.155Z
Reserved: 2024-02-19T00:00:00
Link: CVE-2024-26458

Updated: 2024-08-02T00:07:19.467Z

Status : Analyzed
Published: 2024-02-29T01:44:18.780
Modified: 2025-05-23T15:39:31.357
Link: CVE-2024-26458
