First published: Mon Jul 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix overflow checking of wmfw header Fix the checking that firmware file buffer is large enough for the wmfw header, to prevent overrunning the buffer. The original code tested that the firmware data buffer contained enough bytes for the sums of the size of the structs wmfw_header + wmfw_adsp1_sizes + wmfw_footer But wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and Halo Core the equivalent struct is wmfw_adsp2_sizes, which is 4 bytes longer. So the length check didn't guarantee that there are enough bytes in the firmware buffer for a header with wmfw_adsp2_sizes. This patch splits the length check into three separate parts. Each of the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked separately before they are used.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.100 | 6.1.100 |
redhat/kernel | <6.6.41 | 6.6.41 |
redhat/kernel | <6.9.10 | 6.9.10 |
redhat/kernel | <6.10 | 6.10 |
Linux Kernel | >=5.16<6.1.100 | |
Linux Kernel | >=6.2<6.6.41 | |
Linux Kernel | >=6.7<6.9.10 | |
Linux Kernel | =6.10-rc1 | |
Linux Kernel | =6.10-rc2 | |
Linux Kernel | =6.10-rc3 | |
Linux Kernel | =6.10-rc4 | |
Linux Kernel | =6.10-rc5 | |
Linux Kernel | =6.10-rc6 | |
Linux Kernel | =6.10-rc7 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41039 is classified as medium due to potential buffer overflow risks.
To fix CVE-2024-41039, update your kernel to version 6.1.100, 6.6.41, 6.9.10, or 6.10 based on your operating system.
CVE-2024-41039 affects Linux kernel versions from 5.16 up to 6.1.100, 6.2 to 6.6.41, 6.7 to 6.9.10, and specific 6.10 release candidates.
Systems running affected versions of the Linux kernel, particularly those using the cs_dsp firmware, are vulnerable to CVE-2024-41039.
There is no known workaround for CVE-2024-41039; updating the kernel is the recommended approach to mitigate the vulnerability.