In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Use strnlen() instead of strlen() on the algorithm and coefficient name string arrays in V1 wmfw files. In V1 wmfw files the name is a NUL-terminated string in a fixed-size array. cs_dsp should protect against overrunning the array if the NUL terminator is missing.
https://git.kernel.org/stable/c/680e126ec0400f6daecf0510c5bb97a55779ff03
https://git.kernel.org/stable/c/53a9f8cdbf35a682e9894e1a606f4640e5359185
https://git.kernel.org/stable/c/392cff2f86a25a4286ff3151c7739143c61c1781
https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21