← Zuruck zu CVEs
CVE-2024-38541
CRITICAL9.8
Beschreibung
In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/19/2024
Zuletzt geandert11/3/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Schwachen (CWE)
CWE-120
Referenzen
https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/46795440ef2b4ac919d09310a69a404c5bc90a88(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5d59fd637a8af42b211a92b2edb2474325b4d488(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/733e62786bdf1b2b9dbb09ba2246313306503414(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.