CVE-2024-43877

In the Linux kernel, the following vulnerability has been resolved: media: pci: ivtv: Add check for DMA map result In case DMA fails, 'dma->SG_length' is 0. This value is later used to access 'dma->SGarray[dma->SG_length - 1]', which will cause out of bounds access. Add check to return early on invalid value. Adjust warnings accordingly. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Oct 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/81d0664bed91a858c7b50c263954b59d65f1b414 -

26 Sep 2025, 18:37

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-125
References () https://git.kernel.org/stable/c/24062aa7407091dee3e45a8e8037df437e848718 - () https://git.kernel.org/stable/c/24062aa7407091dee3e45a8e8037df437e848718 - Patch
References () https://git.kernel.org/stable/c/3d8fd92939e21ff0d45100ab208f8124af79402a - () https://git.kernel.org/stable/c/3d8fd92939e21ff0d45100ab208f8124af79402a - Patch
References () https://git.kernel.org/stable/c/629913d6d79508b166c66e07e4857e20233d85a9 - () https://git.kernel.org/stable/c/629913d6d79508b166c66e07e4857e20233d85a9 - Patch
References () https://git.kernel.org/stable/c/c766065e8272085ea9c436414b7ddf1f12e7787b - () https://git.kernel.org/stable/c/c766065e8272085ea9c436414b7ddf1f12e7787b - Patch

Information

Published : 2024-08-21 01:15

Updated : 2025-10-19 15:15


NVD link : CVE-2024-43877

Mitre link : CVE-2024-43877

CVE.ORG link : CVE-2024-43877


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read