U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26787

Change History

Initial Analysis by NIST 3/20/2025 6:39:37 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.10.213
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.152
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.81
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.21
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.9
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85 Types: Patch