In the Linux kernel, the following vulnerability has been resolved: atl1c:
Work around the DMA RX overflow issue This is based on alx driver commit
881d0327db37 (“net: alx: Work around the DMA RX overflow issue”). The alx
and atl1c drivers had RX overflow error which was why a custom allocator
was created to avoid certain addresses. The simpler workaround then created
for alx driver, but not for atl1c due to lack of tester. Instead of using a
custom allocator, check the allocated skb address and use skb_reserve() to
move away from problematic 0x…fc0 address. Tested on AR8131 on Acer 4540.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/86565682e9053e5deb128193ea9e88531bbae9cf (6.7-rc1)
git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb
git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa
git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6
git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf
git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315
launchpad.net/bugs/cve/CVE-2023-52834
nvd.nist.gov/vuln/detail/CVE-2023-52834
security-tracker.debian.org/tracker/CVE-2023-52834
www.cve.org/CVERecord?id=CVE-2023-52834