U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52763 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data. The `i3c_master_bus_init` function may attach the I2C devices before the I3C bus initialization. In this flow, the DAT `alloc_entry`` will be used before the DAT `init`. Additionally, if the `i3c_master_bus_init` fails, the DAT `cleanup` will execute before the device is detached, which will execue DAT `free_entry` function. The above scenario can cause the driver to use DAT_data when it is NULL.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/39c71357e68e2f03766f9321b9f4882e49ff1442
https://git.kernel.org/stable/c/39c71357e68e2f03766f9321b9f4882e49ff1442
https://git.kernel.org/stable/c/3cb79a365e7cce8f121bba91312e2ddd206b9781
https://git.kernel.org/stable/c/3cb79a365e7cce8f121bba91312e2ddd206b9781
https://git.kernel.org/stable/c/b53e9758a31c683fc8615df930262192ed5f034b
https://git.kernel.org/stable/c/b53e9758a31c683fc8615df930262192ed5f034b
https://git.kernel.org/stable/c/e64d23dc65810be4e3395d72df0c398f60c991f9
https://git.kernel.org/stable/c/e64d23dc65810be4e3395d72df0c398f60c991f9
https://git.kernel.org/stable/c/eed74230435c61eeb58abaa275b1820e6a4b7f02
https://git.kernel.org/stable/c/eed74230435c61eeb58abaa275b1820e6a4b7f02

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52763
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org