{"id":"CVE-2023-52763","summary":"i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.\n\nThe `i3c_master_bus_init` function may attach the I2C devices before the\nI3C bus initialization. In this flow, the DAT `alloc_entry`` will be used\nbefore the DAT `init`. Additionally, if the `i3c_master_bus_init` fails,\nthe DAT `cleanup` will execute before the device is detached, which will\nexecue DAT `free_entry` function. The above scenario can cause the driver\nto use DAT_data when it is NULL.","modified":"2026-03-20T12:32:46.067112Z","published":"2024-05-21T15:30:48.369Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52763.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/39c71357e68e2f03766f9321b9f4882e49ff1442"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3cb79a365e7cce8f121bba91312e2ddd206b9781"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b53e9758a31c683fc8615df930262192ed5f034b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e64d23dc65810be4e3395d72df0c398f60c991f9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eed74230435c61eeb58abaa275b1820e6a4b7f02"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52763.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52763"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0"},{"fixed":"39c71357e68e2f03766f9321b9f4882e49ff1442"},{"fixed":"e64d23dc65810be4e3395d72df0c398f60c991f9"},{"fixed":"3cb79a365e7cce8f121bba91312e2ddd206b9781"},{"fixed":"eed74230435c61eeb58abaa275b1820e6a4b7f02"},{"fixed":"b53e9758a31c683fc8615df930262192ed5f034b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52763.json"}}],"schema_version":"1.7.5"}