CVE-2024-41056

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41056
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41056.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41056
Downstream
Related
Published
2024-07-29T15:15:13Z
Modified
2025-08-09T20:01:28Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files

Use strnlen() instead of strlen() on the algorithm and coefficient name string arrays in V1 wmfw files.

In V1 wmfw files the name is a NUL-terminated string in a fixed-size array. cs_dsp should protect against overrunning the array if the NUL terminator is missing.

References

Affected packages