๐Ÿ” CVE Alert

CVE-2024-49977

UNKNOWN 0.0

net: stmmac: Fix zero-division error when disabling tc cbs

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider when offload is disabled") allows the "port_transmit_rate_kbps" to be set to a value of 0, which is then passed to the "div_s64" function when tc-cbs is disabled. This leads to a zero-division error. When tc-cbs is disabled, the idleslope, sendslope, and credit values the credit values are not required to be configured. Therefore, adding a return statement after setting the txQ mode to DCB when tc-cbs is disabled would prevent a zero-division error.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b4bca4722fda928810d024350493990de39f1e40 < e33fe25b1efe4f2e6a5858786dbc82ae4c44ed4c 2145583e5995598f50d66f8710c86bb1e910ac46 < b0da9504a528f05f97d926b4db74ff21917a33e9 521d42a1c24d638241220d4b9fa7e7a0ed02b88e < 5d43e1ad4567d67af2b42d3ab7c14152ffed25c6 a71b686418ee6bcb6d6365f7f6d838d9874d9c64 < 03582f4752427f60817d896f1a827aff772bd31e b8c43360f6e424131fa81d3ba8792ad8ff25a09e < e297a2bf56d12fd7f91a0c209eb6ea84361f3368 b8c43360f6e424131fa81d3ba8792ad8ff25a09e < 837d9df9c0792902710149d1a5e0991520af0f93 b8c43360f6e424131fa81d3ba8792ad8ff25a09e < 675faf5a14c14a2be0b870db30a70764df81e2df f01782804147a8c21f481b3342c83422c041d2c0
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e33fe25b1efe4f2e6a5858786dbc82ae4c44ed4c git.kernel.org: https://git.kernel.org/stable/c/b0da9504a528f05f97d926b4db74ff21917a33e9 git.kernel.org: https://git.kernel.org/stable/c/5d43e1ad4567d67af2b42d3ab7c14152ffed25c6 git.kernel.org: https://git.kernel.org/stable/c/03582f4752427f60817d896f1a827aff772bd31e git.kernel.org: https://git.kernel.org/stable/c/e297a2bf56d12fd7f91a0c209eb6ea84361f3368 git.kernel.org: https://git.kernel.org/stable/c/837d9df9c0792902710149d1a5e0991520af0f93 git.kernel.org: https://git.kernel.org/stable/c/675faf5a14c14a2be0b870db30a70764df81e2df lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html