In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file Return an error from cs_dsp_power_up() if a block header is longer than the amount of data left in the file. The previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop while there was enough data left in the file for a valid region. This protected against overrunning the end of the file data, but it didn't abort the file processing with an error.
https://git.kernel.org/stable/c/b8be70566b33abbd0180105070b4c67cfef8c44f
https://git.kernel.org/stable/c/959fe01e85b7241e3ec305d657febbe82da16a02
https://git.kernel.org/stable/c/90ab191b7d181057d71234e8632e06b5844ac38e
https://git.kernel.org/stable/c/6eabd23383805725eff416c203688b7a390d4153