In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix possible use-after-free and null-ptr-deref
The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
|
History
17 Mar 2025, 16:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 CWE-476 |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:* |
|
First Time |
Netapp 8300 Firmware
Debian debian Linux Netapp h610c Firmware Linux linux Kernel Netapp h615c Netapp 8700 Netapp c400 Netapp a400 Netapp Netapp h610s Netapp 8700 Firmware Netapp h610s Firmware Netapp h615c Firmware Linux Netapp 8300 Netapp e-series Santricity Os Controller Netapp a400 Firmware Debian Netapp c400 Firmware Netapp h610c |
|
References | () https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b - Patch | |
References | () https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b - Patch | |
References | () https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 - Patch | |
References | () https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d - Patch | |
References | () https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 - Patch | |
References | () https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee - Patch | |
References | () https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa - Patch | |
References | () https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20241101-0012/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
27 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE |
Information
Published : 2024-04-03 17:15
Updated : 2025-03-17 16:05
NVD link : CVE-2024-26735
Mitre link : CVE-2024-26735
CVE.ORG link : CVE-2024-26735
JSON object : View
Products Affected
netapp
- a400
- h610c_firmware
- 8300_firmware
- 8700_firmware
- a400_firmware
- c400
- h610s
- h615c
- c400_firmware
- h615c_firmware
- e-series_santricity_os_controller
- h610s_firmware
- 8300
- 8700
- h610c
debian
- debian_linux
linux
- linux_kernel