In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
Check that all fields of a V2 algorithm header fit into the available
firmware data buffer.
The wmfw V2 format introduced variable-length strings in the algorithm
block header. This means the overall header length is variable, and the
position of most fields varies depending on the length of the string
fields. Each field must be checked to ensure that it does not overflow
the firmware data buffer.
As this ia bugfix patch, the fixes avoid making any significant change to
the existing code. This makes it easier to review and less likely to
introduce new bugs.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d - Patch | |
References | () https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e - Patch | |
References | () https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11 - Patch | |
References | () https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa - Patch |
08 Aug 2024, 17:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d - Patch | |
References | () https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e - Patch | |
References | () https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11 - Patch | |
References | () https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41038
Mitre link : CVE-2024-41038
CVE.ORG link : CVE-2024-41038
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')