Executive Summary

Informations
Name CVE-2024-56728 First vendor Publication 2024-12-29
Vendor Cve Last vendor Modification 2025-01-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c

Add error pointer check after calling otx2_mbox_get_rsp().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56728

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-754 Improper Check for Unusual or Exceptional Conditions

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3667

Sources (Detail)

https://git.kernel.org/stable/c/05a6ce174c0c724e5914e1e5efd826bab8f382b4
https://git.kernel.org/stable/c/2db2194727b1f49a5096c1c3981adef1b7638733
https://git.kernel.org/stable/c/55c41b97001a09bb490ffa2e667e251d75d15ab1
https://git.kernel.org/stable/c/5ff9de1f2712cbca53da2e37d831eea7ffcb43b6
https://git.kernel.org/stable/c/6cda142cee032b8fe65ee11f78721721c3988feb
https://git.kernel.org/stable/c/c0f64fd73b60aee85f88c270c9d714ead27a7b7a
https://git.kernel.org/stable/c/e26f8eac6bb20b20fdb8f7dc695711ebce4c7c5c
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-01-08 00:20:51
  • Multiple Updates
2024-12-29 17:20:29
  • First insertion