{"id":"CVE-2024-26684","summary":"net: stmmac: xgmac: fix handling of DPP safety error for DMA channels","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels\n\nCommit 56e58d6c8a56 (\"net: stmmac: Implement Safety Features in\nXGMAC core\") checks and reports safety errors, but leaves the\nData Path Parity Errors for each channel in DMA unhandled at all, lead to\na storm of interrupt.\nFix it by checking and clearing the DMA_DPP_Interrupt_Status register.","modified":"2026-04-02T10:05:28.895456Z","published":"2024-04-02T07:01:46.687Z","related":["SUSE-SU-2024:1490-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26684.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2fc45a4631ac7837a5c497cb4f7e2115d950fc37"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b48c9e258c8691c2f093ee07b1ea3764caaa1b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46eba193d04f8bd717e525eb4110f3c46c12aec3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6609e98ed82966a1b3168c142aca30f8284a7b89"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e0ff50131e9d1aa507be8e670d38e9300a5f5bf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e42ff0844fe418c7d03a14f9f90e1b91ba119591"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e9837c83befb5b852fa76425dde98a87b737df00"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26684.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26684"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"56e58d6c8a5640eb708e85866e9d243d0357ee54"},{"fixed":"e9837c83befb5b852fa76425dde98a87b737df00"},{"fixed":"2fc45a4631ac7837a5c497cb4f7e2115d950fc37"},{"fixed":"6609e98ed82966a1b3168c142aca30f8284a7b89"},{"fixed":"e42ff0844fe418c7d03a14f9f90e1b91ba119591"},{"fixed":"7e0ff50131e9d1aa507be8e670d38e9300a5f5bf"},{"fixed":"3b48c9e258c8691c2f093ee07b1ea3764caaa1b2"},{"fixed":"46eba193d04f8bd717e525eb4110f3c46c12aec3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26684.json"}}],"schema_version":"1.7.5"}