In the Linux kernel, the following vulnerability has been resolved:
media: pci: ivtv: Add check for DMA map result
In case DMA fails, 'dma->SG_length' is 0. This value is later used to
access 'dma->SGarray[dma->SG_length - 1]', which will cause out of
bounds access.
Add check to return early on invalid value. Adjust warnings accordingly.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    29 Oct 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
19 Oct 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
26 Sep 2025, 18:37
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.1 | 
| First Time | Linux Linux linux Kernel | |
| References | () https://git.kernel.org/stable/c/24062aa7407091dee3e45a8e8037df437e848718 - Patch | |
| References | () https://git.kernel.org/stable/c/3d8fd92939e21ff0d45100ab208f8124af79402a - Patch | |
| References | () https://git.kernel.org/stable/c/629913d6d79508b166c66e07e4857e20233d85a9 - Patch | |
| References | () https://git.kernel.org/stable/c/c766065e8272085ea9c436414b7ddf1f12e7787b - Patch | |
| CWE | CWE-125 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 
21 Aug 2024, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-21 01:15
Updated : 2025-10-29 14:15
NVD link : CVE-2024-43877
Mitre link : CVE-2024-43877
CVE.ORG link : CVE-2024-43877
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
