Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c Add error pointer check after calling otx2_mbox_get_rsp().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.7, < 5.10.231 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/05a6ce174c0c724e5914e1e5efd826bab8f382b4Patch
- https://git.kernel.org/stable/c/2db2194727b1f49a5096c1c3981adef1b7638733Patch
- https://git.kernel.org/stable/c/55c41b97001a09bb490ffa2e667e251d75d15ab1Patch
- https://git.kernel.org/stable/c/5ff9de1f2712cbca53da2e37d831eea7ffcb43b6Patch
- https://git.kernel.org/stable/c/6cda142cee032b8fe65ee11f78721721c3988febPatch
- https://git.kernel.org/stable/c/c0f64fd73b60aee85f88c270c9d714ead27a7b7aPatch
- https://git.kernel.org/stable/c/e26f8eac6bb20b20fdb8f7dc695711ebce4c7c5cPatch
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
FAQ
What is CVE-2024-56728?
CVE-2024-56728 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c Add error pointer check after calling otx2_mbox_get_rsp().
How severe is CVE-2024-56728?
CVE-2024-56728 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-56728?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.