U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26804

Change History

Initial Analysis by NIST 3/21/2025 10:58:15 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.151
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.212
          *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.34 up to (excluding) 5.4.271
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.81
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.21
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.9
          *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/2e95350fe9db9d53c701075060ac8ac883b68aee Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/ab63de24ebea36fe73ac7121738595d704b66d96 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/f81e94d2dcd2397137edcb8b85f4c5bed5d22383 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/2e95350fe9db9d53c701075060ac8ac883b68aee Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/ab63de24ebea36fe73ac7121738595d704b66d96 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/f81e94d2dcd2397137edcb8b85f4c5bed5d22383 Types: Patch