U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-52466

Change History

New CVE Received from kernel.org 2/26/2024 11:27:48 AM

Action Type Old Value New Value
Added Description

								
							
							
						
In the Linux kernel, the following vulnerability has been resolved:

PCI: Avoid potential out-of-bounds read in pci_dev_for_each_resource()

Coverity complains that pointer in the pci_dev_for_each_resource() may be
wrong, i.e., might be used for the out-of-bounds read.

There is no actual issue right now because we have another check afterwards
and the out-of-bounds read is not being performed. In any case it's better
code with this fixed, hence the proposed change.

As Jonas pointed out "It probably makes the code slightly less performant
as res will now be checked for being not NULL (which will always be true),
but I doubt it will be significant (or in any hot paths)."
Added Reference

								
							
							
						
Linux https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405 [No types assigned]
Added Reference

								
							
							
						
Linux https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179 [No types assigned]
Added Reference

								
							
							
						
Linux https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933 [No types assigned]