In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
Commit 56e58d6c8a56 ("net: stmmac: Implement Safety Features in
XGMAC core") checks and reports safety errors, but leaves the
Data Path Parity Errors for each channel in DMA unhandled at all, lead to
a storm of interrupt.
Fix it by checking and clearing the DMA_DPP_Interrupt_Status register.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2024-04-02 07:15
Updated : 2025-03-17 15:41
NVD link : CVE-2024-26684
Mitre link : CVE-2024-26684
CVE.ORG link : CVE-2024-26684
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
