CVE-2024-41038
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers<br />
<br />
Check that all fields of a V2 algorithm header fit into the available<br />
firmware data buffer.<br />
<br />
The wmfw V2 format introduced variable-length strings in the algorithm<br />
block header. This means the overall header length is variable, and the<br />
position of most fields varies depending on the length of the string<br />
fields. Each field must be checked to ensure that it does not overflow<br />
the firmware data buffer.<br />
<br />
As this ia bugfix patch, the fixes avoid making any significant change to<br />
the existing code. This makes it easier to review and less likely to<br />
introduce new bugs.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d
- https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e
- https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11
- https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa
- https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d
- https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e
- https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11
- https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



