CVE-2024-26927

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
28/04/2024
Last modified:
21/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: SOF: Add some bounds checking to firmware data<br /> <br /> Smatch complains about "head-&gt;full_size - head-&gt;header_size" can<br /> underflow. To some extent, we&amp;#39;re always going to have to trust the<br /> firmware a bit. However, it&amp;#39;s easy enough to add a check for negatives,<br /> and let&amp;#39;s add a upper bounds check as well.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19 (including) 6.1.83 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.2 (excluding)