In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix TX CQE error handling For an unknown TX CQE error type (probably from a newer hardware), still free the SKB, update the queue tail, etc., otherwise the accounting will be wrong. Also, TX errors can be triggered by injecting corrupted packets, so replace the WARN_ONCE to ratelimited error logging.
History

Mon, 04 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-02T21:52:36.292Z

Updated: 2024-11-04T14:48:41.943Z

Reserved: 2024-02-20T12:30:33.319Z

Link: CVE-2023-52532

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:20.762Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-02T22:15:48.660

Modified: 2024-03-04T13:58:23.447

Link: CVE-2023-52532

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-02T00:00:00Z

Links: CVE-2023-52532 - Bugzilla