{"vulnerability": "CVE-2024-56719", "sightings": [{"uuid": "91776a31-7716-403a-bc5d-f54b50f680d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56719", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "436e8c34-cbca-4080-8538-0191208d1de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56719", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legomd3okf25", "content": "", "creation_timestamp": "2024-12-29T09:15:54.450090Z"}, {"uuid": "8c487cd7-aeb0-4ec2-a880-7fe2b826071d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56719", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113735377501320028", "content": "", "creation_timestamp": "2024-12-29T09:22:15.005204Z"}, {"uuid": "21c2c1fa-7979-4874-91e1-93b4ea6c1a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56719", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/debian-linux-kernel-multiple-vulnerabilities_20260506", "content": "", "creation_timestamp": "2026-05-05T20:00:00.000000Z"}, {"uuid": "5b3009fd-a2b5-4866-88a0-8d39a3370411", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56719", "type": "seen", "source": "https://t.me/cvedetector/13862", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56719 - \"DWC-eth-dwmac DMA Cookie Corruption Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-56719 \nPublished : Dec. 29, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: stmmac: fix TSO DMA API usage causing oops  \n  \nCommit 66600fac7a98 (\"net: stmmac: TSO: Fix unbalanced DMA map/unmap  \nfor non-paged SKB data\") moved the assignment of tx_skbuff_dma[]'s  \nmembers to be later in stmmac_tso_xmit().  \n  \nThe buf (dma cookie) and len stored in this structure are passed to  \ndma_unmap_single() by stmmac_tx_clean(). The DMA API requires that  \nthe dma cookie passed to dma_unmap_single() is the same as the value  \nreturned from dma_map_single(). However, by moving the assignment  \nlater, this is not the case when priv-&gt;dma_cap.addr64 &gt; 32 as \"des\"  \nis offset by proto_hdr_len.  \n  \nThis causes problems such as:  \n  \n  dwc-eth-dwmac 2490000.ethernet eth0: Tx DMA map failed  \n  \nand with DMA_API_DEBUG enabled:  \n  \n  DMA-API: dwc-eth-dwmac 2490000.ethernet: device driver tries to +free DMA memory it has not allocated [device address=0x000000ffffcf65c0] [size=66 bytes]  \n  \nFix this by maintaining \"des\" as the original DMA cookie, and use  \ntso_des to pass the offset DMA cookie to stmmac_tso_allocator().  \n  \nFull details of the crashes can be found at:  \n  \n \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T10:41:10.000000Z"}]}