In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix possible use-after-free and null-ptr-deref
The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
ipv6: sr: fix possible use-after-free and null-ptr-deref
The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
DSA-5658-1 | linux security update |
![]() |
DSA-5681-1 | linux security update |
![]() |
USN-6777-1 | Linux kernel vulnerabilities |
![]() |
USN-6777-2 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6777-3 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-6777-4 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-6820-1 | Linux kernel vulnerabilities |
![]() |
USN-6820-2 | Linux kernel (NVIDIA) vulnerabilities |
![]() |
USN-6821-1 | Linux kernel vulnerabilities |
![]() |
USN-6821-2 | Linux kernel vulnerabilities |
![]() |
USN-6821-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6821-4 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6828-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6831-1 | Linux kernel vulnerabilities |
![]() |
USN-6871-1 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-6892-1 | Linux kernel (IBM) vulnerabilities |
![]() |
USN-6895-1 | Linux kernel vulnerabilities |
![]() |
USN-6895-2 | Linux kernel vulnerabilities |
![]() |
USN-6895-3 | Linux kernel vulnerabilities |
![]() |
USN-6895-4 | Linux kernel vulnerabilities |
![]() |
USN-6900-1 | Linux kernel vulnerabilities |
![]() |
USN-6919-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 17 Mar 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Linux Linux linux Kernel Netapp Netapp 8300 Netapp 8300 Firmware Netapp 8700 Netapp 8700 Firmware Netapp a400 Netapp a400 Firmware Netapp c400 Netapp c400 Firmware Netapp e-series Santricity Os Controller Netapp h610c Netapp h610c Firmware Netapp h610s Netapp h610s Firmware Netapp h615c Netapp h615c Firmware |
|
CPEs | cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:8300:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:8700:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:a400:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:c400:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Linux Linux linux Kernel Netapp Netapp 8300 Netapp 8300 Firmware Netapp 8700 Netapp 8700 Firmware Netapp a400 Netapp a400 Firmware Netapp c400 Netapp c400 Firmware Netapp e-series Santricity Os Controller Netapp h610c Netapp h610c Firmware Netapp h610s Netapp h610s Firmware Netapp h615c Netapp h615c Firmware |
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 05 Nov 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T08:55:13.758Z
Reserved: 2024-02-19T14:20:24.165Z
Link: CVE-2024-26735

Updated: 2024-11-01T17:03:12.597Z

Status : Analyzed
Published: 2024-04-03T17:15:51.147
Modified: 2025-03-17T16:05:01.547
Link: CVE-2024-26735


No data.