First published: Wed Apr 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-26735">CVE-2024-26735</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.308 | 4.19.308 |
redhat/kernel | <5.4.270 | 5.4.270 |
redhat/kernel | <5.10.211 | 5.10.211 |
redhat/kernel | <5.15.150 | 5.15.150 |
redhat/kernel | <6.1.80 | 6.1.80 |
redhat/kernel | <6.6.19 | 6.6.19 |
redhat/kernel | <6.7.7 | 6.7.7 |
redhat/kernel | <6.8 | 6.8 |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.17-1 6.12.19-1 | |
Linux Kernel | >=4.10<4.19.308 | |
Linux Kernel | >=4.20<5.4.270 | |
Linux Kernel | >=5.5<5.10.211 | |
Linux Kernel | >=5.11<5.15.150 | |
Linux Kernel | >=5.16<6.1.80 | |
Linux Kernel | >=6.2<6.6.19 | |
Linux Kernel | >=6.7<6.7.7 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
Linux Kernel | =6.8-rc5 | |
Debian Linux | =10.0 | |
All of | ||
NetApp AFF 8300 Firmware | ||
NetApp FAS8300 | ||
All of | ||
NetApp AFF 8700 Firmware | ||
NetApp FAS8700 | ||
All of | ||
NetApp AFF A400 Firmware | ||
NetApp FAS A400 | ||
All of | ||
NetApp C400 | ||
NetApp C400 Firmware | ||
All of | ||
NetApp H610C | ||
NetApp H610C Firmware | ||
All of | ||
NetApp HCI H610S Firmware | ||
NetApp H610S Firmware | ||
All of | ||
NetApp H615C | ||
NetApp H615C | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26735 is classified as a high severity vulnerability in the Linux kernel.
To fix CVE-2024-26735, update the Linux kernel to version 4.19.308 or later for Red Hat systems or install the corresponding patched versions for other distributions.
CVE-2024-26735 is caused by a potential use-after-free and null pointer dereference in the IPv6 Segment Routing implementation in the Linux kernel.
Versions of the Linux kernel prior to 4.19.308, 5.4.270, 5.10.211, 5.15.150, 6.1.80, 6.6.19, 6.7.7, and 6.8 are affected by CVE-2024-26735.
Yes, CVE-2024-26735 could potentially be exploited remotely, leading to a denial of service or arbitrary code execution.