Executive Summary

Informations
Name CVE-2024-56727 First vendor Publication 2024-12-29
Vendor Cve Last vendor Modification 2025-01-06

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c

Adding error pointer check after calling otx2_mbox_get_rsp().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56727

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3667

Sources (Detail)

https://git.kernel.org/stable/c/8c9f8b35dc3d4ad8053a72bc0c5a7843591f6b75
https://git.kernel.org/stable/c/a479b3d7586e6f77f8337bbcac980eaf2d0a4029
https://git.kernel.org/stable/c/bd3110bc102ab6292656b8118be819faa0de8dd0
https://git.kernel.org/stable/c/c4eae7bac880edd88aaed6a8ec2997fa85e259c7
https://git.kernel.org/stable/c/e5e60f17d2462ef5c13db4d1a54eef5778fd2295
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2025-01-08 00:20:52
  • Multiple Updates
2025-01-07 03:08:08
  • Multiple Updates
2025-01-07 00:20:35
  • Multiple Updates
2025-01-06 21:20:35
  • Multiple Updates
2024-12-29 17:20:29
  • First insertion