{"api_version":"1","generated_at":"2026-04-23T03:49:25+00:00","cve":"CVE-2024-26754","urls":{"html":"https://cve.report/CVE-2024-26754","api":"https://cve.report/api/cve/CVE-2024-26754.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26754","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26754"},"summary":{"title":"CVE-2024-26754","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-04-03 17:15:00","updated_at":"2024-04-03 17:24:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a","name":"https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576","name":"https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861","name":"https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec","name":"https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e","name":"https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77","name":"https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca","name":"https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7","name":"https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7","refsource":"","tags":[],"title":"gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26754","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26754","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-26754","qid":"6000567","title":"Debian Security Update for linux (DSA 5658-1)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-04-03 17:15:00","lastModifiedDate":"2024-04-03 17:24:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}