CVE-2024-56726
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/12/2024
Last modified:
06/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c<br />
<br />
Add error pointer check after calling otx2_mbox_get_rsp().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.174 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/41f39f4c67253f802809310be6846ff408c3c758
- https://git.kernel.org/stable/c/54abcec092616a4d01195355eb5d6036fb8fe363
- https://git.kernel.org/stable/c/856ad633e11869729be698df2287ecfe6ec31f27
- https://git.kernel.org/stable/c/a374e7e79fbdd7574bd89344447b0d4b91ba9801
- https://git.kernel.org/stable/c/ac9183023b6a9c09467516abd8aab04f9a2f9564
- https://git.kernel.org/stable/c/c5a6c5af434671aea739a5a41c849819144f02c9