CVE-2026-24825

N/A Unknown

📋 TL;DR

This CVE describes a memory leak vulnerability in ydb-platform's ydb software, specifically in the yajl modules within yail_tree.C. Attackers could exploit this to cause denial of service through resource exhaustion. Users running affected ydb versions are impacted.

💻 Affected Systems

Products:
  • ydb-platform ydb
Versions: through 24.4.4.2
Operating Systems: All platforms running ydb
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using yajl parsing functionality in ydb. The vulnerability is in the yail_tree.C file within contrib/libs/yajl modules.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or unavailability due to memory exhaustion, potentially leading to data loss or service disruption.

🟠

Likely Case

Gradual performance degradation and eventual service instability as memory consumption increases over time.

🟢

If Mitigated

Minimal impact with proper monitoring and resource limits in place, though memory usage may still be higher than expected.

🌐 Internet-Facing: MEDIUM - While not directly exploitable for remote code execution, memory exhaustion could disrupt services accessible from the internet.
🏢 Internal Only: MEDIUM - Similar impact potential for internal services, though attack surface may be more limited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Memory leak vulnerabilities typically require repeated triggering to cause significant impact. Exploitation would depend on accessing yajl parsing functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.4.4.3 or later (check GitHub PR for exact version)

Vendor Advisory: https://github.com/ydb-platform/ydb/pull/17570

Restart Required: Yes

Instructions:

1. Check current ydb version. 2. Update to version 24.4.4.3 or later. 3. Restart ydb services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Memory usage monitoring and limits

all

Implement monitoring and resource limits to detect and prevent memory exhaustion

# Set memory limits for ydb process
# Use ulimit or container memory limits
# Example: docker run --memory=2g ydb

Reduce yajl parsing usage

all

Limit or avoid usage of yajl parsing functionality if possible

# Review application code for yajl usage
# Consider alternative parsing methods if feasible

🧯 If You Can't Patch

  • Implement aggressive memory monitoring and alerting for ydb processes
  • Deploy rate limiting or input validation for yajl parsing operations

🔍 How to Verify

Check if Vulnerable:

Check ydb version and compare against affected range. Review if yajl parsing is used in your deployment.

Check Version:

ydb --version or check ydb package version

Verify Fix Applied:

Update to patched version and monitor memory usage during yajl parsing operations for stability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory growth patterns in ydb processes
  • Out of memory errors or crashes in ydb logs
  • Increased swap usage

Network Indicators:

  • Service degradation or timeouts from ydb endpoints
  • Increased response times

SIEM Query:

source="ydb.log" ("out of memory" OR "memory allocation failed" OR "segmentation fault")

🔗 References

📤 Share & Export