CVE-2024-40928

Source
https://cve.org/CVERecord?id=CVE-2024-40928
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40928.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-40928
Downstream
Related
Published
2024-07-12T12:25:07.769Z
Modified
2026-03-20T12:37:22.873488Z
Summary
net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: ethtool: fix the error condition in ethtoolgetphystatsethtool()

Clang static checker (scan-build) warning: net/ethtool/ioctl.c:line 2233, column 2 Called function pointer is null (null dereference).

Return '-EOPNOTSUPP' when 'ops->getethtoolphy_stats' is NULL to fix this typo error.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40928.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c882f2178f22f3740e20a6bd6b8df1c0500301bf
Fixed
25504f7fe60058b2a9553a9e424fb7dd9683843e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
72d1c4a07780e24827c29bad203a1167d67181ed
Fixed
c3ba0557ab2ef15a3663e2fb9b1a3d628a8c3daa
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
981c6e178cf333ac9568665e6d786f795f5cb3ad
Fixed
f9e57e7ca77393b5b7072800370370b02eaad0f8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
201ed315f9676809cd5b20a39206e964106d4f27
Fixed
6548d543a27449a1a3d8079925de93f5764d6f22
Fixed
92196be82a4eb61813833dc62876fd198ae51ab1
Fixed
0dcc53abf58d572d34c5313de85f607cd33fc691

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40928.json"