vulnerability
Red Hat: CVE-2024-41056: kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:H/Au:M/C:P/I:P/A:C) | Jul 29, 2024 | Sep 25, 2024 | Jul 9, 2025 |
Severity
5
CVSS
(AV:L/AC:H/Au:M/C:P/I:P/A:C)
Published
Jul 29, 2024
Added
Sep 25, 2024
Modified
Jul 9, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
Use strnlen() instead of strlen() on the algorithm and coefficient name
string arrays in V1 wmfw files.
In V1 wmfw files the name is a NUL-terminated string in a fixed-size
array. cs_dsp should protect against overrunning the array if the NUL
terminator is missing.
Solution(s)
no-fix-redhat-rpm-packageredhat-upgrade-kernelredhat-upgrade-kernel-rt

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.