{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-52834","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T15:19:24.252Z","datePublished":"2024-05-21T15:31:35.575Z","dateUpdated":"2026-01-05T10:17:47.147Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:17:47.147Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\natl1c: Work around the DMA RX overflow issue\n\nThis is based on alx driver commit 881d0327db37 (\"net: alx: Work around\nthe DMA RX overflow issue\").\n\nThe alx and atl1c drivers had RX overflow error which was why a custom\nallocator was created to avoid certain addresses. The simpler workaround\nthen created for alx driver, but not for atl1c due to lack of tester.\n\nInstead of using a custom allocator, check the allocated skb address and\nuse skb_reserve() to move away from problematic 0x...fc0 address.\n\nTested on AR8131 on Acer 4540."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/atheros/atl1c/atl1c.h","drivers/net/ethernet/atheros/atl1c/atl1c_main.c"],"versions":[{"version":"43250ddd75a35d1f7926d989a10fefd30c37eaa7","lessThan":"c29a89b23f67ee592f4dee61f9d7efbf86d60315","status":"affected","versionType":"git"},{"version":"43250ddd75a35d1f7926d989a10fefd30c37eaa7","lessThan":"57e44ff9c2c9747b2b1a53556810b0e5192655d6","status":"affected","versionType":"git"},{"version":"43250ddd75a35d1f7926d989a10fefd30c37eaa7","lessThan":"54a6152da4993ec8e4b53dc3cf577f5a2c829afa","status":"affected","versionType":"git"},{"version":"43250ddd75a35d1f7926d989a10fefd30c37eaa7","lessThan":"32f08b7b430ee01ec47d730f961a3306c1c7b6fb","status":"affected","versionType":"git"},{"version":"43250ddd75a35d1f7926d989a10fefd30c37eaa7","lessThan":"86565682e9053e5deb128193ea9e88531bbae9cf","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/atheros/atl1c/atl1c.h","drivers/net/ethernet/atheros/atl1c/atl1c_main.c"],"versions":[{"version":"2.6.29","status":"affected"},{"version":"0","lessThan":"2.6.29","status":"unaffected","versionType":"semver"},{"version":"5.15.140","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.64","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.13","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6.3","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"5.15.140"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.1.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.5.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.6.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.29","versionEndExcluding":"6.7"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315"},{"url":"https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6"},{"url":"https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa"},{"url":"https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb"},{"url":"https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf"}],"title":"atl1c: Work around the DMA RX overflow issue","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52834","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-21T18:09:31.471989Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:23:26.205Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:11:36.046Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf","tags":["x_transferred"]}]}]}}