CVE-2024-41056

Updated: 2024-09-24 04:22:16.290822

Description:

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Use strnlen() instead of strlen() on the algorithm and coefficient name string arrays in V1 wmfw files. In V1 wmfw files the name is a NUL-terminated string in a fixed-size array. cs_dsp should protect against overrunning the array if the NUL terminator is missing.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 5.2

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.2 MEDIUM Ignored 2024-09-25 12:26:14
CentOS 6 ELS kernel 2.6.32 5.2 MEDIUM Ignored 2024-09-25 12:26:14
CentOS 7 ELS kernel 3.10.0 5.2 MEDIUM Ignored 2024-09-25 12:26:13
CentOS 8.4 ELS kernel 4.18.0 5.2 MEDIUM Ignored 2024-10-09 03:43:07
CentOS 8.5 ELS kernel 4.18.0 5.2 MEDIUM Ignored 2024-10-09 03:43:07
CentOS Stream 8 ELS kernel 4.18.0 5.2 MEDIUM Released CLSA-2024:1727815919 2024-10-01 17:26:37
CloudLinux 6 ELS kernel 2.6.32 5.2 MEDIUM Ignored 2024-09-25 12:26:14
CloudLinux 7 ELS kernel 3.10.0 5.2 MEDIUM Ignored 2024-09-25 12:26:13
Oracle Linux 6 ELS kernel 2.6.32 5.2 MEDIUM Ignored 2024-09-25 12:26:13