CVE-2024-49977: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider when offload is disabled") allows the "port_transmit_rate_kbps" to be set to a value of 0, which is then passed to the "div_s64" function when tc-cbs is disabled. This leads to a zero-division error. When tc-cbs is disabled, the idleslope, sendslope, and credit values the credit values are not required to be configured. Therefore, adding a return statement after setting the txQ mode to DCB when tc-cbs is disabled would prevent a zero-division error.
AI Analysis
Technical Summary
CVE-2024-49977 is a vulnerability identified in the Linux kernel's network driver component, specifically within the stmmac (Synopsys Ethernet MAC) driver. The issue arises from a zero-division error triggered when the Traffic Control Credit-Based Shaper (tc-cbs) feature is disabled. The root cause is a code change (commit b8c43360f6e4) that allows the variable "port_transmit_rate_kbps" to be set to zero. This zero value is subsequently passed to the div_s64 function, which performs division operations without validating the divisor. When tc-cbs is disabled, certain parameters such as idleslope, sendslope, and credit values are not configured, making the division by zero possible. The vulnerability can cause kernel crashes or denial of service (DoS) conditions due to the unhandled zero-division error. The fix involves adding a return statement after setting the transmit queue mode to Data Center Bridging (DCB) when tc-cbs is disabled, preventing the division by zero from occurring. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is relevant to systems using the stmmac driver for Ethernet networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the stmmac network driver, which is common in embedded systems, network appliances, and some server environments. Exploitation could lead to kernel panics or system crashes, resulting in denial of service. This could disrupt critical network infrastructure, especially in sectors relying on Linux-based networking equipment such as telecommunications, data centers, and industrial control systems. The impact on confidentiality and integrity is minimal since the vulnerability does not directly allow code execution or privilege escalation. However, availability could be significantly affected, potentially causing outages or degraded network performance. Organizations with high availability requirements or those operating critical infrastructure in Europe should be particularly cautious. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public.
Mitigation Recommendations
European organizations should promptly update their Linux kernel to versions that include the patch for CVE-2024-49977. Specifically, they should ensure that the stmmac driver is updated to the fixed commit or later. For embedded or specialized devices where kernel updates are not straightforward, vendors should be contacted for firmware updates or mitigations. Network administrators should monitor systems for unexpected kernel crashes or network interface failures that could indicate exploitation attempts. Additionally, implementing robust network segmentation can limit the impact of potential DoS conditions. For environments where immediate patching is not feasible, disabling or avoiding the use of the tc-cbs feature on affected interfaces can serve as a temporary workaround. Regular backups and system redundancy will help maintain availability in case of service disruption. Finally, organizations should maintain vigilance for any emerging exploit reports or indicators of compromise related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-49977: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider when offload is disabled") allows the "port_transmit_rate_kbps" to be set to a value of 0, which is then passed to the "div_s64" function when tc-cbs is disabled. This leads to a zero-division error. When tc-cbs is disabled, the idleslope, sendslope, and credit values the credit values are not required to be configured. Therefore, adding a return statement after setting the txQ mode to DCB when tc-cbs is disabled would prevent a zero-division error.
AI-Powered Analysis
Technical Analysis
CVE-2024-49977 is a vulnerability identified in the Linux kernel's network driver component, specifically within the stmmac (Synopsys Ethernet MAC) driver. The issue arises from a zero-division error triggered when the Traffic Control Credit-Based Shaper (tc-cbs) feature is disabled. The root cause is a code change (commit b8c43360f6e4) that allows the variable "port_transmit_rate_kbps" to be set to zero. This zero value is subsequently passed to the div_s64 function, which performs division operations without validating the divisor. When tc-cbs is disabled, certain parameters such as idleslope, sendslope, and credit values are not configured, making the division by zero possible. The vulnerability can cause kernel crashes or denial of service (DoS) conditions due to the unhandled zero-division error. The fix involves adding a return statement after setting the transmit queue mode to Data Center Bridging (DCB) when tc-cbs is disabled, preventing the division by zero from occurring. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is relevant to systems using the stmmac driver for Ethernet networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the stmmac network driver, which is common in embedded systems, network appliances, and some server environments. Exploitation could lead to kernel panics or system crashes, resulting in denial of service. This could disrupt critical network infrastructure, especially in sectors relying on Linux-based networking equipment such as telecommunications, data centers, and industrial control systems. The impact on confidentiality and integrity is minimal since the vulnerability does not directly allow code execution or privilege escalation. However, availability could be significantly affected, potentially causing outages or degraded network performance. Organizations with high availability requirements or those operating critical infrastructure in Europe should be particularly cautious. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public.
Mitigation Recommendations
European organizations should promptly update their Linux kernel to versions that include the patch for CVE-2024-49977. Specifically, they should ensure that the stmmac driver is updated to the fixed commit or later. For embedded or specialized devices where kernel updates are not straightforward, vendors should be contacted for firmware updates or mitigations. Network administrators should monitor systems for unexpected kernel crashes or network interface failures that could indicate exploitation attempts. Additionally, implementing robust network segmentation can limit the impact of potential DoS conditions. For environments where immediate patching is not feasible, disabling or avoiding the use of the tc-cbs feature on affected interfaces can serve as a temporary workaround. Regular backups and system redundancy will help maintain availability in case of service disruption. Finally, organizations should maintain vigilance for any emerging exploit reports or indicators of compromise related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.052Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdced8
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 9:42:01 PM
Last updated: 8/17/2025, 10:25:14 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.