In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Return error if block header overflows file
Return an error from cs_dsp_power_up() if a block header is longer
than the amount of data left in the file.
The previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop
while there was enough data left in the file for a valid region. This
protected against overrunning the end of the file data, but it didn't
abort the file processing with an error.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-07 16:15
Updated : 2024-08-08 14:54
NVD link : CVE-2024-42238
Mitre link : CVE-2024-42238
CVE.ORG link : CVE-2024-42238
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')