{"id":"CVE-2024-26735","summary":"ipv6: sr: fix possible use-after-free and null-ptr-deref","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix possible use-after-free and null-ptr-deref\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.","modified":"2026-03-20T12:35:10.369001Z","published":"2024-04-03T17:00:21.972Z","related":["ALSA-2024:3619","ALSA-2024:4211","ALSA-2024:4352","SUSE-SU-2024:2892-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26735.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197"},{"type":"WEB","url":"https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26735.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26735"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241101-0012/"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"915d7e5e5930b4f01d0971d93b9b25ed17d221aa"},{"fixed":"953f42934533c151f440cd32390044d2396b87aa"},{"fixed":"82831e3ff76ef09fb184eb93b79a3eb3fb284f1d"},{"fixed":"65c38f23d10ff79feea1e5d50b76dc7af383c1e6"},{"fixed":"91b020aaa1e59bfb669d34c968e3db3d5416bcee"},{"fixed":"8391b9b651cfdf80ab0f1dc4a489f9d67386e197"},{"fixed":"9e02973dbc6a91e40aa4f5d87b8c47446fbfce44"},{"fixed":"02b08db594e8218cfbc0e4680d4331b457968a9b"},{"fixed":"5559cea2d5aa3018a5f00dd2aca3427ba09b386b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26735.json"}}],"schema_version":"1.7.5"}