U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26744

Change History

Initial Analysis by NIST 4/04/2025 10:33:24 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.80
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.150
          *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.3 up to (excluding) 4.19.308
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.10.211
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.19
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.7
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Types: Mailing List
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f Types: Patch