← Volver a CVEs
CVE-2024-38541
CRITICAL9.8
Descripcion
In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/19/2024
Ultima modificacion11/3/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
linux:linux_kernel
Debilidades (CWE)
CWE-120
Referencias
https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/46795440ef2b4ac919d09310a69a404c5bc90a88(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5d59fd637a8af42b211a92b2edb2474325b4d488(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/733e62786bdf1b2b9dbb09ba2246313306503414(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.