{
   "containers": {
      "cna": {
         "providerMetadata": {
            "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
         },
         "descriptions": [
            {
               "lang": "en",
               "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch: Bounds check priority\n\nNothing was explicitly bounds checking the priority index used to access\nclpriop[]. WARN and bail out early if it's pathological. Seen with GCC 13:\n\n../net/sched/sch_htb.c: In function 'htb_activate_prios':\n../net/sched/sch_htb.c:437:44: warning: array subscript [0, 31] is outside array bounds of 'struct htb_prio[8]' [-Warray-bounds=]\n  437 |                         if (p->inner.clprio[prio].feed.rb_node)\n      |                             ~~~~~~~~~~~~~~~^~~~~~\n../net/sched/sch_htb.c:131:41: note: while referencing 'clprio'\n  131 |                         struct htb_prio clprio[TC_HTB_NUMPRIO];\n      |                                         ^~~~~~"
            }
         ],
         "affected": [
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "unaffected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "versions": [
                  {
                     "version": "1da177e4c3f4",
                     "lessThan": "fbe71c5dacaa",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "1da177e4c3f4",
                     "lessThan": "90fcf55d83b2",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "1da177e4c3f4",
                     "lessThan": "99875ea9b5b4",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "1da177e4c3f4",
                     "lessThan": "f6415c9c9a0b",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "1da177e4c3f4",
                     "lessThan": "de5ca4c3852f",
                     "status": "affected",
                     "versionType": "git"
                  }
               ]
            },
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "affected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "versions": [
                  {
                     "version": "5.4.232",
                     "lessThanOrEqual": "5.4.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.10.169",
                     "lessThanOrEqual": "5.10.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.15.95",
                     "lessThanOrEqual": "5.15.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.1.13",
                     "lessThanOrEqual": "6.1.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.2",
                     "lessThanOrEqual": "*",
                     "status": "unaffected",
                     "versionType": "original_commit_for_fix"
                  }
               ]
            }
         ],
         "references": [
            {
               "url": "https://git.kernel.org/stable/c/fbe71c5dacaa5a9960323215f118958174c81aa0"
            },
            {
               "url": "https://git.kernel.org/stable/c/90fcf55d83b20da1091f926a291af05fb74f61c6"
            },
            {
               "url": "https://git.kernel.org/stable/c/99875ea9b5b47995bfb3c684d21eb17feb4b7e6a"
            },
            {
               "url": "https://git.kernel.org/stable/c/f6415c9c9a0b3881543d38528a58b54af4351522"
            },
            {
               "url": "https://git.kernel.org/stable/c/de5ca4c3852f896cacac2bf259597aab5e17d9e3"
            }
         ],
         "title": "net: sched: sch: Bounds check priority",
         "x_generator": {
            "engine": "bippy-d175d3acf727"
         }
      }
   },
   "cveMetadata": {
      "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
      "cveID": "CVE-2023-52734",
      "requesterUserId": "gregkh@kernel.org",
      "serial": "1",
      "state": "PUBLISHED"
   },
   "dataType": "CVE_RECORD",
   "dataVersion": "5.0"
}
