U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52834 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: atl1c: Work around the DMA RX overflow issue This is based on alx driver commit 881d0327db37 ("net: alx: Work around the DMA RX overflow issue"). The alx and atl1c drivers had RX overflow error which was why a custom allocator was created to avoid certain addresses. The simpler workaround then created for alx driver, but not for atl1c due to lack of tester. Instead of using a custom allocator, check the allocated skb address and use skb_reserve() to move away from problematic 0x...fc0 address. Tested on AR8131 on Acer 4540.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb
https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb
https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa
https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa
https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6
https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6
https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf
https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf
https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315
https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52834
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org