CVE-2024-38541

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
19/06/2024
Last modified:
04/06/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> of: module: add buffer overflow check in of_modalias()<br /> <br /> In of_modalias(), if the buffer happens to be too small even for the 1st<br /> snprintf() call, the len parameter will become negative and str parameter<br /> (if not NULL initially) will point beyond the buffer&amp;#39;s end. Add the buffer<br /> overflow check after the 1st snprintf() call and fix such check after the<br /> strlen() call (accounting for the terminating NUL char).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)