CVE-2024-43877

HIGH

Linux Kernel < 6.1.103 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: media: pci: ivtv: Add check for DMA map result In case DMA fails, 'dma->SG_length' is 0. This value is later used to access 'dma->SGarray[dma->SG_length - 1]', which will cause out of bounds access. Add check to return early on invalid value. Adjust warnings accordingly. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Scores

CVSS v3 7.1
EPSS 0.0003
EPSS Percentile 7.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (4)
linux/Kernel 5.16.0 - 6.1.103linux
linux/Kernel 6.2.0 - 6.6.44linux
linux/Kernel 6.7.0 - 6.10.3linux
linux/linux_kernel 5.16 - 6.1.103
Published Aug 21, 2024
Tracked Since Feb 18, 2026