CVE-2023-52766

In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler Do not loop over ring headers in hci_dma_irq_handler() that are not allocated and enabled in hci_dma_init(). Otherwise out of bounds access will occur from rings->headers[i] access when i >= number of allocated ring headers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Jan 2025, 20:29

Type Values Removed Values Added
CWE CWE-125
References () https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574 - () https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574 - Patch
References () https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65 - () https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65 - Patch
References () https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6 - () https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6 - Patch
References () https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b - () https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b - Patch
References () https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df - () https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

21 Nov 2024, 08:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: i3c: mipi-i3c-hci: corrige el acceso fuera de los límites en hci_dma_irq_handler. No realice bucles sobre encabezados de anillo en hci_dma_irq_handler() que no estén asignados y habilitados en hci_dma_init(). De lo contrario, el acceso fuera de los límites se producirá desde el acceso de anillos->encabezados[i] cuando i >= número de encabezados de anillo asignados.
References () https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574 - () https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574 -
References () https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65 - () https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65 -
References () https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6 - () https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6 -
References () https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b - () https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b -
References () https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df - () https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df -

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-01-06 20:29


NVD link : CVE-2023-52766

Mitre link : CVE-2023-52766

CVE.ORG link : CVE-2023-52766


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read