CVE-2023-52834

Source
https://cve.org/CVERecord?id=CVE-2023-52834
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52834.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52834
Downstream
Related
Published
2024-05-21T15:31:35.575Z
Modified
2026-03-14T12:23:14.933465Z
Summary
atl1c: Work around the DMA RX overflow issue
Details

In the Linux kernel, the following vulnerability has been resolved:

atl1c: Work around the DMA RX overflow issue

This is based on alx driver commit 881d0327db37 ("net: alx: Work around the DMA RX overflow issue").

The alx and atl1c drivers had RX overflow error which was why a custom allocator was created to avoid certain addresses. The simpler workaround then created for alx driver, but not for atl1c due to lack of tester.

Instead of using a custom allocator, check the allocated skb address and use skb_reserve() to move away from problematic 0x...fc0 address.

Tested on AR8131 on Acer 4540.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52834.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
43250ddd75a35d1f7926d989a10fefd30c37eaa7
Fixed
c29a89b23f67ee592f4dee61f9d7efbf86d60315
Fixed
57e44ff9c2c9747b2b1a53556810b0e5192655d6
Fixed
54a6152da4993ec8e4b53dc3cf577f5a2c829afa
Fixed
32f08b7b430ee01ec47d730f961a3306c1c7b6fb
Fixed
86565682e9053e5deb128193ea9e88531bbae9cf

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52834.json"