CVE-2024-26735

Source
https://cve.org/CVERecord?id=CVE-2024-26735
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26735.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26735
Downstream
Related
Published
2024-04-03T17:00:21.972Z
Modified
2026-03-13T07:51:57.918064Z
Summary
ipv6: sr: fix possible use-after-free and null-ptr-deref
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix possible use-after-free and null-ptr-deref

The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26735.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
915d7e5e5930b4f01d0971d93b9b25ed17d221aa
Fixed
953f42934533c151f440cd32390044d2396b87aa
Fixed
82831e3ff76ef09fb184eb93b79a3eb3fb284f1d
Fixed
65c38f23d10ff79feea1e5d50b76dc7af383c1e6
Fixed
91b020aaa1e59bfb669d34c968e3db3d5416bcee
Fixed
8391b9b651cfdf80ab0f1dc4a489f9d67386e197
Fixed
9e02973dbc6a91e40aa4f5d87b8c47446fbfce44
Fixed
02b08db594e8218cfbc0e4680d4331b457968a9b
Fixed
5559cea2d5aa3018a5f00dd2aca3427ba09b386b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26735.json"