CVE-2024-41056

Updated: 2025-11-19 04:59:21.740623

Description:

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Use strnlen() instead of strlen() on the algorithm and coefficient name string arrays in V1 wmfw files. In V1 wmfw files the name is a NUL-terminated string in a fixed-size array. cs_dsp should protect against overrunning the array if the NUL terminator is missing.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2025-09-23 10:21:06 This issue is confined to the cs_dsp firmware loader when parsing V1 .wmfw files for specific Cirrus...
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:14 Ignored due to low severity
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-25 12:26:13 Ignored due to low severity
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-10-09 03:43:07 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-10-09 03:43:07 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727815919 2024-10-01 17:26:37
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:14 Ignored due to low severity
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-25 12:26:13 Ignored due to low severity
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:13 Ignored due to low severity