CVE-2024-43877

medium

Description

In the Linux kernel, the following vulnerability has been resolved: media: pci: ivtv: Add check for DMA map result In case DMA fails, 'dma->SG_length' is 0. This value is later used to access 'dma->SGarray[dma->SG_length - 1]', which will cause out of bounds access. Add check to return early on invalid value. Adjust warnings accordingly. Found by Linux Verification Center (linuxtesting.org) with SVACE.

References

https://git.kernel.org/stable/c/c766065e8272085ea9c436414b7ddf1f12e7787b

https://git.kernel.org/stable/c/629913d6d79508b166c66e07e4857e20233d85a9

https://git.kernel.org/stable/c/3d8fd92939e21ff0d45100ab208f8124af79402a

https://git.kernel.org/stable/c/24062aa7407091dee3e45a8e8037df437e848718

Details

Source: Mitre, NVD

Published: 2024-08-21

Updated: 2024-08-21

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium