U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26684

Change History

Initial Analysis by NIST 3/17/2025 11:41:04 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.15.149
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.210
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4 from (excluding) 5.4.269
          *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 6.1.78
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.17
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.7.5
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/2fc45a4631ac7837a5c497cb4f7e2115d950fc37 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/3b48c9e258c8691c2f093ee07b1ea3764caaa1b2 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/46eba193d04f8bd717e525eb4110f3c46c12aec3 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/6609e98ed82966a1b3168c142aca30f8284a7b89 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/7e0ff50131e9d1aa507be8e670d38e9300a5f5bf Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/e42ff0844fe418c7d03a14f9f90e1b91ba119591 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/e9837c83befb5b852fa76425dde98a87b737df00 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/2fc45a4631ac7837a5c497cb4f7e2115d950fc37 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/3b48c9e258c8691c2f093ee07b1ea3764caaa1b2 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/46eba193d04f8bd717e525eb4110f3c46c12aec3 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/6609e98ed82966a1b3168c142aca30f8284a7b89 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/7e0ff50131e9d1aa507be8e670d38e9300a5f5bf Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/e42ff0844fe418c7d03a14f9f90e1b91ba119591 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/e9837c83befb5b852fa76425dde98a87b737df00 Types: Patch