CVE-2023-52466

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

03 Mar 2024, 08:15

Type Values Removed Values Added
Summary In the Linux kernel, the following vulnerability has been resolved: PCI: Avoid potential out-of-bounds read in pci_dev_for_each_resource() Coverity complains that pointer in the pci_dev_for_each_resource() may be wrong, i.e., might be used for the out-of-bounds read. There is no actual issue right now because we have another check afterwards and the out-of-bounds read is not being performed. In any case it's better code with this fixed, hence the proposed change. As Jonas pointed out "It probably makes the code slightly less performant as res will now be checked for being not NULL (which will always be true), but I doubt it will be significant (or in any hot paths)." Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
References
  • {'url': 'https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933', 'name': 'https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405', 'name': 'https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405', 'tags': [], 'refsource': ''}
  • {'url': 'https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179', 'name': 'https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179', 'tags': [], 'refsource': ''}

26 Feb 2024, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2024-04-16 18:42


NVD link : CVE-2023-52466

Mitre link : CVE-2023-52466

CVE.ORG link : CVE-2023-52466


JSON object : View

Products Affected

No product.

CWE

No CWE.