CVE-2024-43877
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
21/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: pci: ivtv: Add check for DMA map result<br />
<br />
In case DMA fails, &#39;dma->SG_length&#39; is 0. This value is later used to<br />
access &#39;dma->SGarray[dma->SG_length - 1]&#39;, which will cause out of<br />
bounds access.<br />
<br />
Add check to return early on invalid value. Adjust warnings accordingly.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/24062aa7407091dee3e45a8e8037df437e848718
- https://git.kernel.org/stable/c/38f72c7e7c6b55614f9407555fd5ce9d019b0fa4
- https://git.kernel.org/stable/c/3d8fd92939e21ff0d45100ab208f8124af79402a
- https://git.kernel.org/stable/c/629913d6d79508b166c66e07e4857e20233d85a9
- https://git.kernel.org/stable/c/81d0664bed91a858c7b50c263954b59d65f1b414
- https://git.kernel.org/stable/c/c766065e8272085ea9c436414b7ddf1f12e7787b
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



