CVE-2024-42237

Source
https://cve.org/CVERecord?id=CVE-2024-42237
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42237.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42237
Downstream
Related
Published
2024-08-07T15:14:26.221Z
Modified
2026-03-11T07:48:42.537198Z
Summary
firmware: cs_dsp: Validate payload length before processing block
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Validate payload length before processing block

Move the payload length check in csdspload() and csdspcoeff_load() to be done before the block is processed.

The check that the length of a block payload does not exceed the number of remaining bytes in the firwmware file buffer was being done near the end of the loop iteration. However, some code before that check used the length field without validating it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42237.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6bc909e7673c30abcbdb329e7d0aa2e83c103d7
Fixed
259955eca9b7acf1299b1ac077d8cfbe12df35d8
Fixed
3a9cd924aec1288d675df721f244da4dd7e16cff
Fixed
71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8
Fixed
6598afa9320b6ab13041616950ca5f8f938c0cf1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42237.json"