U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-52734

Change History

CVE Rejected by kernel.org 5/28/2024 3:15:09 PM

Action Type Old Value New Value

CVE Modified by kernel.org 5/28/2024 3:15:09 PM

Action Type Old Value New Value
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

net: sched: sch: Bounds check priority

Nothing was explicitly bounds checking the priority index used to access
clpriop[]. WARN and bail out early if it's pathological. Seen with GCC 13:

../net/sched/sch_htb.c: In function 'htb_activate_prios':
../net/sched/sch_htb.c:437:44: warning: array subscript [0, 31] is outside array bounds of 'struct htb_prio[8]' [-Warray-bounds=]
  437 |                         if (p->inner.clprio[prio].feed.rb_node)
      |                             ~~~~~~~~~~~~~~~^~~~~~
../net/sched/sch_htb.c:131:41: note: while referencing 'clprio'
  131 |                         struct htb_prio clprio[TC_HTB_NUMPRIO];
      |                                         ^~~~~~
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed Reference
kernel.org https://git.kernel.org/stable/c/90fcf55d83b20da1091f926a291af05fb74f61c6

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/99875ea9b5b47995bfb3c684d21eb17feb4b7e6a

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/de5ca4c3852f896cacac2bf259597aab5e17d9e3

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/f6415c9c9a0b3881543d38528a58b54af4351522

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/fbe71c5dacaa5a9960323215f118958174c81aa0

								
						

CVE Translated by kernel.org 5/28/2024 3:15:09 PM

Action Type Old Value New Value
Removed Translation
Title: kernel de Linux
Description:  En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: sch: Prioridad de verificación de límites. Nada estaba explícitamente limitado al verificar el índice de prioridad utilizado para acceder a clpriop[]. AVISO y salga temprano si es patológico. Visto con GCC 13: ../net/sched/sch_htb.c: En función 'htb_activate_prios': ../net/sched/sch_htb.c:437:44: advertencia: el subíndice de matriz [0, 31] está fuera de los límites de la matriz de 'struct htb_prio[8]' [-Warray-bounds=] 437 | si (p->inner.clprio[prio].feed.rb_node) | ~~~~~~~~~~~~~~~^~~~~~ ../net/sched/sch_htb.c:131:41: nota: al hacer referencia a 'clprio' 131 | estructura htb_prio clprio[TC_HTB_NUMPRIO]; | ^~~~~~