U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-35853

Change History

Initial Analysis by NIST 4/07/2025 3:03:01 PM

Action Type Old Value New Value
Added CWE

								
							
							
						
CWE-401
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.30
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.216
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.1 up to (excluding) 5.4.275
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.158
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.90
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.8.9
          *cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839df13977 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839df13977 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76 Types: Patch