U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26790

Change History

Initial Analysis by NIST 2/27/2025 5:01:53 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
CWE-667
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.15.151
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.212
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.1 from (excluding) 5.4.271
          *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 6.1.81
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.21
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.7.9
          *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/106c1ac953a66556ec77456c46e818208d3a9bce Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/518d78b4fac68cac29a263554d7f3b19da99d0da Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/5b696e9c388251f1c7373be92293769a489fd367 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/9d739bccf261dd93ec1babf82f5c5d71dd4caa3e Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/ad2f8920c314e0a2d9e984fc94b729eca3cda471 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/bb3a06e9b9a30e33d96aadc0e077be095a4f8580 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/106c1ac953a66556ec77456c46e818208d3a9bce Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/518d78b4fac68cac29a263554d7f3b19da99d0da Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/5b696e9c388251f1c7373be92293769a489fd367 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/9d739bccf261dd93ec1babf82f5c5d71dd4caa3e Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/ad2f8920c314e0a2d9e984fc94b729eca3cda471 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/bb3a06e9b9a30e33d96aadc0e077be095a4f8580 Types: Patch