CVE-2024-26735

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.
References
Link Resource
https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b Patch
https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b Patch
https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 Patch
https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d Patch
https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 Patch
https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee Patch
https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa Patch
https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 Patch
https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b Patch
https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b Patch
https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6 Patch
https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d Patch
https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197 Patch
https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee Patch
https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa Patch
https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
https://security.netapp.com/advisory/ntap-20241101-0012/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:*

Configuration 10 (hide)

cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-04-03 17:15

Updated : 2025-03-17 16:05


NVD link : CVE-2024-26735

Mitre link : CVE-2024-26735

CVE.ORG link : CVE-2024-26735


JSON object : View

Products Affected

netapp

  • 8700
  • h615c_firmware
  • 8300
  • h615c
  • h610c_firmware
  • h610s
  • h610s_firmware
  • a400
  • c400_firmware
  • a400_firmware
  • e-series_santricity_os_controller
  • c400
  • 8700_firmware
  • h610c
  • 8300_firmware

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-476

NULL Pointer Dereference