In the Linux kernel, the following vulnerability has been resolved:
of: module: add buffer overflow check in of_modalias()
In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).
References
Configurations
Configuration 1 (hide)
|
History
02 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Apr 2025, 18:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6 - Patch | |
References | () https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252 - Patch | |
References | () https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a - Patch | |
References | () https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e - Patch |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6 - | |
References | () https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252 - | |
References | () https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a - | |
References | () https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e - |
03 Jul 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-120 |
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2025-05-02 07:15
NVD link : CVE-2024-38541
Mitre link : CVE-2024-38541
CVE.ORG link : CVE-2024-38541
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')