U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26633

Change History

Initial Analysis by NIST 4/04/2025 10:49:01 AM

Action Type Old Value New Value
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:9500_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:9500:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a150:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a1k:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a220:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a70:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a800:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a900:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:a90:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:c190:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:c800:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:fas2720:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:fas2750:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:fas2820:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
          *cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.75
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.14
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.2
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.268
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.148
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.209
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.19.306
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://security.netapp.com/advisory/ntap-20241220-0001/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd Types: Patch