Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2024-56679 First vendor Publication 2024-12-28
Vendor Cve Last vendor Modification 2024-12-28

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c

Add error pointer check after calling otx2_mbox_get_rsp().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56679

Sources (Detail)

https://git.kernel.org/stable/c/0fbc7a5027c6f7f2c785adae3dcec22b2f2b69b3
https://git.kernel.org/stable/c/4b88b202cf1ae79159a94fff9500f9be31559235
https://git.kernel.org/stable/c/52c63a6a27d3178fab533fcfb4baa2ed5b8608a3
https://git.kernel.org/stable/c/785c6758ea32aca73ba9331f7d902f7ce9a25757
https://git.kernel.org/stable/c/9265b6ee754226f61bd122ec57141a781d4e0dcb
https://git.kernel.org/stable/c/d4d5139d280f5837f16d116614c05c2b4eeaf28f
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-12-28 13:20:29
  • First insertion