In the Linux kernel, the following vulnerability has been resolved: PCI:
Avoid potential out-of-bounds read in pci_dev_for_each_resource() Coverity
complains that pointer in the pci_dev_for_each_resource() may be wrong,
i.e., might be used for the out-of-bounds read. There is no actual issue
right now because we have another check afterwards and the out-of-bounds
read is not being performed. In any case it’s better code with this fixed,
hence the proposed change. As Jonas pointed out “It probably makes the code
slightly less performant as res will now be checked for being not NULL
(which will always be true), but I doubt it will be significant (or in any
hot paths).”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-6.5 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-laptop | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-lowlatency | < any | UNKNOWN |