Skip to main content

CVE-2024-49977: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-49977cvecve-2024-49977
Published: Mon Oct 21 2024 (10/21/2024, 18:02:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix zero-division error when disabling tc cbs The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider when offload is disabled") allows the "port_transmit_rate_kbps" to be set to a value of 0, which is then passed to the "div_s64" function when tc-cbs is disabled. This leads to a zero-division error. When tc-cbs is disabled, the idleslope, sendslope, and credit values the credit values are not required to be configured. Therefore, adding a return statement after setting the txQ mode to DCB when tc-cbs is disabled would prevent a zero-division error.

AI-Powered Analysis

AILast updated: 06/27/2025, 21:42:01 UTC

Technical Analysis

CVE-2024-49977 is a vulnerability identified in the Linux kernel's network driver component, specifically within the stmmac (Synopsys Ethernet MAC) driver. The issue arises from a zero-division error triggered when the Traffic Control Credit-Based Shaper (tc-cbs) feature is disabled. The root cause is a code change (commit b8c43360f6e4) that allows the variable "port_transmit_rate_kbps" to be set to zero. This zero value is subsequently passed to the div_s64 function, which performs division operations without validating the divisor. When tc-cbs is disabled, certain parameters such as idleslope, sendslope, and credit values are not configured, making the division by zero possible. The vulnerability can cause kernel crashes or denial of service (DoS) conditions due to the unhandled zero-division error. The fix involves adding a return statement after setting the transmit queue mode to Data Center Bridging (DCB) when tc-cbs is disabled, preventing the division by zero from occurring. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is relevant to systems using the stmmac driver for Ethernet networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the stmmac network driver, which is common in embedded systems, network appliances, and some server environments. Exploitation could lead to kernel panics or system crashes, resulting in denial of service. This could disrupt critical network infrastructure, especially in sectors relying on Linux-based networking equipment such as telecommunications, data centers, and industrial control systems. The impact on confidentiality and integrity is minimal since the vulnerability does not directly allow code execution or privilege escalation. However, availability could be significantly affected, potentially causing outages or degraded network performance. Organizations with high availability requirements or those operating critical infrastructure in Europe should be particularly cautious. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public.

Mitigation Recommendations

European organizations should promptly update their Linux kernel to versions that include the patch for CVE-2024-49977. Specifically, they should ensure that the stmmac driver is updated to the fixed commit or later. For embedded or specialized devices where kernel updates are not straightforward, vendors should be contacted for firmware updates or mitigations. Network administrators should monitor systems for unexpected kernel crashes or network interface failures that could indicate exploitation attempts. Additionally, implementing robust network segmentation can limit the impact of potential DoS conditions. For environments where immediate patching is not feasible, disabling or avoiding the use of the tc-cbs feature on affected interfaces can serve as a temporary workaround. Regular backups and system redundancy will help maintain availability in case of service disruption. Finally, organizations should maintain vigilance for any emerging exploit reports or indicators of compromise related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.052Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdced8

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 9:42:01 PM

Last updated: 8/17/2025, 10:25:14 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats