{"api_version":"1","generated_at":"2026-04-23T03:49:58+00:00","cve":"CVE-2024-26735","urls":{"html":"https://cve.report/CVE-2024-26735","api":"https://cve.report/api/cve/CVE-2024-26735.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26735","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26735"},"summary":{"title":"CVE-2024-26735","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-04-03 17:15:00","updated_at":"2024-04-03 17:24:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b","name":"https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d","name":"https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b","name":"https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6","name":"https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee","name":"https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197","name":"https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa","name":"https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44","name":"https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44","refsource":"","tags":[],"title":"ipv6: sr: fix possible use-after-free and null-ptr-deref - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26735","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26735","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-26735","qid":"6000567","title":"Debian Security Update for linux (DSA 5658-1)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-04-03 17:15:00","lastModifiedDate":"2024-04-03 17:24:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}