CVE-2024-41038

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
29/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers<br /> <br /> Check that all fields of a V2 algorithm header fit into the available<br /> firmware data buffer.<br /> <br /> The wmfw V2 format introduced variable-length strings in the algorithm<br /> block header. This means the overall header length is variable, and the<br /> position of most fields varies depending on the length of the string<br /> fields. Each field must be checked to ensure that it does not overflow<br /> the firmware data buffer.<br /> <br /> As this ia bugfix patch, the fixes avoid making any significant change to<br /> the existing code. This makes it easier to review and less likely to<br /> introduce new bugs.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.41 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.10 (excluding)