Bug 1227788 (CVE-2024-40928)

Summary: VUL-0: CVE-2024-40928: kernel: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Michal Hocko <mhocko>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P3 - Medium CC: davide.benini, denis.kirjanov, mhocko, miroslav.franc, mkubecek, rfrohl
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/413855/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40928:3.3:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-15 12:07:01 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()

Clang static checker (scan-build) warning:
net/ethtool/ioctl.c:line 2233, column 2
Called function pointer is null (null dereference).

Return '-EOPNOTSUPP' when 'ops->get_ethtool_phy_stats' is NULL to fix
this typo error.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40928
https://www.cve.org/CVERecord?id=CVE-2024-40928
https://git.kernel.org/stable/c/0dcc53abf58d572d34c5313de85f607cd33fc691
https://git.kernel.org/stable/c/6548d543a27449a1a3d8079925de93f5764d6f22
https://git.kernel.org/stable/c/92196be82a4eb61813833dc62876fd198ae51ab1
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40928.mbox