CVE-2024-38541

In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Apr 2025, 18:36

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6 - () https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6 - Patch
References () https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252 - () https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252 - Patch
References () https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a - () https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a - Patch
References () https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e - () https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e - Patch

Information

Published : 2024-06-19 14:15

Updated : 2025-04-01 18:36


NVD link : CVE-2024-38541

Mitre link : CVE-2024-38541

CVE.ORG link : CVE-2024-38541


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')