CVE-2023-52763

Source
https://cve.org/CVERecord?id=CVE-2023-52763
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52763.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52763
Downstream
Related
Published
2024-05-21T15:30:48.369Z
Modified
2026-04-11T11:57:15.671425Z
Summary
i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.
Details

In the Linux kernel, the following vulnerability has been resolved:

i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.

The i3c_master_bus_init function may attach the I2C devices before the I3C bus initialization. In this flow, the DAT alloc_entry`` will be used before the DATinit. Additionally, if thei3cmasterbusinitfails, the DATcleanupwill execute before the device is detached, which will execue DATfreeentry` function. The above scenario can cause the driver to use DAT_data when it is NULL.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52763.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0
Fixed
39c71357e68e2f03766f9321b9f4882e49ff1442
Fixed
e64d23dc65810be4e3395d72df0c398f60c991f9
Fixed
3cb79a365e7cce8f121bba91312e2ddd206b9781
Fixed
eed74230435c61eeb58abaa275b1820e6a4b7f02
Fixed
b53e9758a31c683fc8615df930262192ed5f034b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52763.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.15.140
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.64
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.13
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52763.json"