SB2024062593 - Buffer overflow in Linux kernel atheros atl1c driver
Published: June 25, 2024 Updated: May 13, 2025
Security Bulletin ID
SB2024062593
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2023-52834)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the atl1c_set_mac_addr(), atl1c_init_ring_ptrs(), atl1c_free_ring_resources(), atl1c_rx_checksum() and atl1c_alloc_rx_buffer() functions in drivers/net/ethernet/atheros/atl1c/atl1c_main.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315
- https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6
- https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa
- https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb
- https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.140
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7