In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix possible use-after-free and null-ptr-deref
The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
|
History
17 Mar 2025, 16:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b - Patch | |
References | () https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b - Patch | |
References | () https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 - Patch | |
References | () https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d - Patch | |
References | () https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 - Patch | |
References | () https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee - Patch | |
References | () https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa - Patch | |
References | () https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20241101-0012/ - Third Party Advisory | |
CWE | CWE-416 CWE-476 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:* |
|
First Time |
Netapp 8300 Firmware
Debian debian Linux Netapp h610c Firmware Linux linux Kernel Netapp h615c Netapp 8700 Netapp c400 Netapp a400 Netapp Netapp h610s Netapp 8700 Firmware Netapp h610s Firmware Netapp h615c Firmware Linux Netapp 8300 Netapp e-series Santricity Os Controller Netapp a400 Firmware Debian Netapp c400 Firmware Netapp h610c |
27 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
Information
Published : 2024-04-03 17:15
Updated : 2025-03-17 16:05
NVD link : CVE-2024-26735
Mitre link : CVE-2024-26735
CVE.ORG link : CVE-2024-26735
JSON object : View
Products Affected
netapp
- h610s
- a400_firmware
- 8700_firmware
- h610s_firmware
- c400_firmware
- h610c
- h615c_firmware
- e-series_santricity_os_controller
- 8700
- a400
- c400
- h615c
- 8300_firmware
- h610c_firmware
- 8300
linux
- linux_kernel
debian
- debian_linux