Linux Kernel Vulnerability in OcteonTX2-PF Components
CVE-2024-56726
Summary
The vulnerability involves an error handling issue in the OcteonTX2-PF components within the Linux kernel. Specifically, it pertains to the handling of responses from the function otx2_mbox_get_rsp in the source file cn10k.c. If not addressed, improper error checking could potentially lead to unexpected behavior or system instability. This has been resolved in the latest kernel updates, which implement necessary checks after the otx2_mbox_get_rsp() call, enhancing the robustness of the kernel in response to mailbox command processing. Users and system administrators are advised to update their kernels to ensure that they benefit from the latest security improvements.
Affected Version(s)
Linux 2ca89a2c37527221edc549ffd3b65c6f8d9d4088
Linux 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 < 856ad633e11869729be698df2287ecfe6ec31f27
Linux 2ca89a2c37527221edc549ffd3b65c6f8d9d4088
References
Timeline
Vulnerability published
Vulnerability Reserved