Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file Return an error from cs_dsp_power_up() if a block header is longer than the amount of data left in the file. The previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop while there was enough data left in the file for a valid region. This protected against overrunning the end of the file data, but it didn't abort the file processing with an error.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.16, < 6.1.100 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6eabd23383805725eff416c203688b7a390d4153Patch
- https://git.kernel.org/stable/c/90ab191b7d181057d71234e8632e06b5844ac38ePatch
- https://git.kernel.org/stable/c/959fe01e85b7241e3ec305d657febbe82da16a02Patch
- https://git.kernel.org/stable/c/b8be70566b33abbd0180105070b4c67cfef8c44fPatch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
FAQ
What is CVE-2024-42238?
CVE-2024-42238 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file Return an error from cs_dsp_power_up() if a block header is longer t...
How severe is CVE-2024-42238?
CVE-2024-42238 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42238?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.