CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.
References
Link Resource
https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b Patch
https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b Patch
https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 Patch
https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d Patch
https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 Patch
https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee Patch
https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa Patch
https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 Patch
https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b Patch
https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b Patch
https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 Patch
https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d Patch
https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 Patch
https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee Patch
https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa Patch
https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
https://security.netapp.com/advisory/ntap-20241101-0012/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:*

Configuration 10 (hide)

cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:05

Type Values Removed Values Added
CWE CWE-416
CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:*
First Time Netapp 8300 Firmware
Debian debian Linux
Netapp h610c Firmware
Linux linux Kernel
Netapp h615c
Netapp 8700
Netapp c400
Netapp a400
Netapp
Netapp h610s
Netapp 8700 Firmware
Netapp h610s Firmware
Netapp h615c Firmware
Linux
Netapp 8300
Netapp e-series Santricity Os Controller
Netapp a400 Firmware
Debian
Netapp c400 Firmware
Netapp h610c
References () https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b - () https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b - Patch
References () https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b - () https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b - Patch
References () https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 - () https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 - Patch
References () https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d - () https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d - Patch
References () https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 - () https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 - Patch
References () https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee - () https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee - Patch
References () https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa - () https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa - Patch
References () https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 - () https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20241101-0012/ - () https://security.netapp.com/advisory/ntap-20241101-0012/ - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

27 Feb 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : unknown
CWE CWE-416

Information

Published : 2024-04-03 17:15

Updated : 2025-03-17 16:05


NVD link : CVE-2024-26735

Mitre link : CVE-2024-26735

CVE.ORG link : CVE-2024-26735


JSON object : View

Products Affected

netapp

  • a400
  • h610c_firmware
  • 8300_firmware
  • 8700_firmware
  • a400_firmware
  • c400
  • h610s
  • h615c
  • c400_firmware
  • h615c_firmware
  • e-series_santricity_os_controller
  • h610s_firmware
  • 8300
  • 8700
  • h610c

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-476

NULL Pointer Dereference