Bugzilla – Bug 1220417
VUL-0: CVE-2023-52466: kernel-source,kernel-source-azure,kernel-source-rt: potential out-of-bounds read in pci_dev_for_each_resource()
Last modified: 2024-03-03 12:03:53 UTC
In the Linux kernel, the following vulnerability has been resolved: PCI: Avoid potential out-of-bounds read in pci_dev_for_each_resource() Coverity complains that pointer in the pci_dev_for_each_resource() may be wrong, i.e., might be used for the out-of-bounds read. There is no actual issue right now because we have another check afterwards and the out-of-bounds read is not being performed. In any case it's better code with this fixed, hence the proposed change. As Jonas pointed out "It probably makes the code slightly less performant as res will now be checked for being not NULL (which will always be true), but I doubt it will be significant (or in any hot paths)." References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52466 https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933 https://www.cve.org/CVERecord?id=CVE-2023-52466 https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405 https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179 https://bugzilla.redhat.com/show_bug.cgi?id=2266210
This is more of a hardening than anything else. Anyhow, we only have `__pci_dev_for_each_res{0,1}()` in the SLE15-SP6 and stable/master branches, which already have the fix, so nothing to do. Closing.
CVE was rejected: https://lore.kernel.org/linux-kernel/2024030301-cornflake-unbounded-02cc@gregkh/