CVE-2024-43875

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43875
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43875.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43875
Downstream
Related
Published
2024-08-21T00:06:27.204Z
Modified
2025-11-28T02:35:46.264684Z
Summary
PCI: endpoint: Clean up error handling in vpci_scan_bus()
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Clean up error handling in vpciscanbus()

Smatch complains about inconsistent NULL checking in vpciscanbus():

drivers/pci/endpoint/functions/pci-epf-vntb.c:1024 vpci_scan_bus() error: we previously assumed 'vpci_bus' could be null (see line 1021)

Instead of printing an error message and then crashing we should return an error code and clean up.

Also the NULL check is reversed so it prints an error for success instead of failure.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43875.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e2b6ef72b7aea9d7d480d2df499bcd1c93247abb
Fixed
24414c842a24d0fd498f9db6d2a762a8dddf1832
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e35f56bb03304abc92c928b641af41ca372966bb
Fixed
7d368de78b60088ec9031c60c88976c0063ea4c0
Fixed
0e27e2e8697b8ce96cdef43f135426525d9d1f8f
Fixed
b9e8695246bcfc028341470cbf92630cdc1ba36b
Fixed
8e0f5a96c534f781e8c57ca30459448b3bfe5429

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.165
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.103
Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.6.44
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.10.3