{"id":"CVE-2023-52766","summary":"i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler\n\nDo not loop over ring headers in hci_dma_irq_handler() that are not\nallocated and enabled in hci_dma_init(). Otherwise out of bounds access\nwill occur from rings-\u003eheaders[i] access when i \u003e= number of allocated\nring headers.","modified":"2026-04-02T09:43:18.878937Z","published":"2024-05-21T15:30:50.343Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3566-1","SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4082-1","SUSE-SU-2024:4131-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52766.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52766.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52766"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0"},{"fixed":"d23ad76f240c0f597b7a9eb79905d246f27d40df"},{"fixed":"8be39f66915b40d26ea2c18ba84b5c3d5da6809b"},{"fixed":"7c2b91b30d74d7c407118ad72502d4ca28af1af6"},{"fixed":"4c86cb2321bd9c72d3b945ce7f747961beda8e65"},{"fixed":"45a832f989e520095429589d5b01b0c65da9b574"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52766.json"}}],"schema_version":"1.7.5"}