CVE-2024-42238

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-42238
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42238.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-42238
Downstream
Related
Published
2024-08-07T15:14:26Z
Modified
2025-10-15T14:05:33.324690Z
Summary
firmware: cs_dsp: Return error if block header overflows file
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Return error if block header overflows file

Return an error from csdsppower_up() if a block header is longer than the amount of data left in the file.

The previous code in csdspload() and csdspload_coeff() would loop while there was enough data left in the file for a valid region. This protected against overrunning the end of the file data, but it didn't abort the file processing with an error.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6bc909e7673c30abcbdb329e7d0aa2e83c103d7
Fixed
b8be70566b33abbd0180105070b4c67cfef8c44f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6bc909e7673c30abcbdb329e7d0aa2e83c103d7
Fixed
90ab191b7d181057d71234e8632e06b5844ac38e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6bc909e7673c30abcbdb329e7d0aa2e83c103d7
Fixed
6eabd23383805725eff416c203688b7a390d4153
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6bc909e7673c30abcbdb329e7d0aa2e83c103d7
Fixed
959fe01e85b7241e3ec305d657febbe82da16a02

Affected versions

v5.*

v5.15
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10-rc1
v6.10-rc2
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7
v6.9.1
v6.9.2
v6.9.3
v6.9.4
v6.9.5
v6.9.6
v6.9.7
v6.9.8
v6.9.9

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "signature_type": "Line",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c"
            },
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "56131865760579234890081106934189915373",
                    "328579854044491859002144169923209043578",
                    "155302546063079488909659291863423418285",
                    "14751150263525529862179725402062174406",
                    "37451726077911016173724213330171271540",
                    "211214410236452821129265980721933239208",
                    "234386617311249979548592427439929494580",
                    "63567092714555567637894597092057934003",
                    "26539908961209678631135690324869259218",
                    "233379447530771550007275215001764399466"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2024-42238-3fa5f6d8",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6eabd23383805725eff416c203688b7a390d4153"
        },
        {
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c",
                "function": "cs_dsp_load"
            },
            "deprecated": false,
            "digest": {
                "length": 4122.0,
                "function_hash": "197147511059182509405645511190933208832"
            },
            "id": "CVE-2024-42238-cf158567",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6eabd23383805725eff416c203688b7a390d4153"
        },
        {
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c",
                "function": "cs_dsp_load"
            },
            "deprecated": false,
            "digest": {
                "length": 4122.0,
                "function_hash": "197147511059182509405645511190933208832"
            },
            "id": "CVE-2024-42238-d96c72c4",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@959fe01e85b7241e3ec305d657febbe82da16a02"
        },
        {
            "signature_version": "v1",
            "signature_type": "Line",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c"
            },
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "56131865760579234890081106934189915373",
                    "328579854044491859002144169923209043578",
                    "155302546063079488909659291863423418285",
                    "14751150263525529862179725402062174406",
                    "37451726077911016173724213330171271540",
                    "211214410236452821129265980721933239208",
                    "234386617311249979548592427439929494580",
                    "63567092714555567637894597092057934003",
                    "26539908961209678631135690324869259218",
                    "233379447530771550007275215001764399466"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2024-42238-f20b29f6",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@959fe01e85b7241e3ec305d657febbe82da16a02"
        },
        {
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c",
                "function": "cs_dsp_load_coeff"
            },
            "deprecated": false,
            "digest": {
                "length": 4525.0,
                "function_hash": "212888446674845990364502310123450560812"
            },
            "id": "CVE-2024-42238-f38bc93b",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@959fe01e85b7241e3ec305d657febbe82da16a02"
        },
        {
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "drivers/firmware/cirrus/cs_dsp.c",
                "function": "cs_dsp_load_coeff"
            },
            "deprecated": false,
            "digest": {
                "length": 4525.0,
                "function_hash": "212888446674845990364502310123450560812"
            },
            "id": "CVE-2024-42238-f49addcc",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6eabd23383805725eff416c203688b7a390d4153"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.100
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.41
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.10