CVE-2024-56727
Published: January 1, 2025Last modified: January 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c Adding error pointer check after calling otx2_mbox_get_rsp().
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.120-r0) |
25 LTS | linux-lts | Fixed (6.12.41-r0) | |
Stream | linux-lts | Fixed (6.12.41-r0) |
References
- https://git.kernel.org/stable/c/8c9f8b35dc3d4ad8053a72bc0c5a7843591f6b75
- https://git.kernel.org/stable/c/a479b3d7586e6f77f8337bbcac980eaf2d0a4029
- https://git.kernel.org/stable/c/bd3110bc102ab6292656b8118be819faa0de8dd0
- https://git.kernel.org/stable/c/c4eae7bac880edd88aaed6a8ec2997fa85e259c7
- https://git.kernel.org/stable/c/e5e60f17d2462ef5c13db4d1a54eef5778fd2295