CVE-2024-42237

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Validate payload length before processing block Move the payload length check in cs_dsp_load() and cs_dsp_coeff_load() to be done before the block is processed. The check that the length of a block payload does not exceed the number of remaining bytes in the firwmware file buffer was being done near the end of the loop iteration. However, some code before that check used the length field without validating it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Aug 2024, 14:54

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-834
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8 - () https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8 - Patch
References () https://git.kernel.org/stable/c/6598afa9320b6ab13041616950ca5f8f938c0cf1 - () https://git.kernel.org/stable/c/6598afa9320b6ab13041616950ca5f8f938c0cf1 - Patch
References () https://git.kernel.org/stable/c/3a9cd924aec1288d675df721f244da4dd7e16cff - () https://git.kernel.org/stable/c/3a9cd924aec1288d675df721f244da4dd7e16cff - Patch
References () https://git.kernel.org/stable/c/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8 - () https://git.kernel.org/stable/c/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8 - Patch

07 Aug 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-07 16:15

Updated : 2024-08-08 14:54


NVD link : CVE-2024-42237

Mitre link : CVE-2024-42237


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-834

Excessive Iteration