In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: Fix zero-division error when disabling tc cbs
The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider when offload is disabled") allows the "porttransmitratekbps" to be set to a value of 0, which is then passed to the "divs64" function when tc-cbs is disabled. This leads to a zero-division error.
When tc-cbs is disabled, the idleslope, sendslope, and credit values the credit values are not required to be configured. Therefore, adding a return statement after setting the txQ mode to DCB when tc-cbs is disabled would prevent a zero-division error.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"80765680087690387416019767583151597225",
"244686010175476655364469732328177495673",
"198013920777896522483254785046360044847",
"90238269916925214130203985516212899399"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e33fe25b1efe4f2e6a5858786dbc82ae4c44ed4c",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c"
},
"id": "CVE-2024-49977-29d009d2"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2145.0,
"function_hash": "55205898283756482749739187460034065242"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@837d9df9c0792902710149d1a5e0991520af0f93",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c",
"function": "tc_setup_cbs"
},
"id": "CVE-2024-49977-89f2561b"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"80765680087690387416019767583151597225",
"244686010175476655364469732328177495673",
"198013920777896522483254785046360044847",
"90238269916925214130203985516212899399"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@03582f4752427f60817d896f1a827aff772bd31e",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c"
},
"id": "CVE-2024-49977-9c3a66bf"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"80765680087690387416019767583151597225",
"244686010175476655364469732328177495673",
"198013920777896522483254785046360044847",
"90238269916925214130203985516212899399"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@837d9df9c0792902710149d1a5e0991520af0f93",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c"
},
"id": "CVE-2024-49977-abaeb5b1"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2145.0,
"function_hash": "55205898283756482749739187460034065242"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@03582f4752427f60817d896f1a827aff772bd31e",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c",
"function": "tc_setup_cbs"
},
"id": "CVE-2024-49977-ee3816df"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2145.0,
"function_hash": "55205898283756482749739187460034065242"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e33fe25b1efe4f2e6a5858786dbc82ae4c44ed4c",
"target": {
"file": "drivers/net/ethernet/stmicro/stmmac/stmmac_tc.c",
"function": "tc_setup_cbs"
},
"id": "CVE-2024-49977-fc85e87a"
}
]