CVE-2024-38541

CRITICAL

Linux kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).

Scores

CVSS v3 9.8
EPSS 0.0011
EPSS Percentile 29.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-120
Status published
Products (8)
linux/Kernel 4.14.0 - 5.4.294linux
linux/Kernel 5.11.0 - 5.15.182linux
linux/Kernel 5.16.0 - 6.1.136linux
linux/Kernel 5.5.0 - 5.10.238linux
linux/Kernel 6.2.0 - 6.6.33linux
linux/Kernel 6.7.0 - 6.8.12linux
linux/Kernel 6.9.0 - 6.9.3linux
linux/linux_kernel 4.14 - 5.4.294
Published Jun 19, 2024
Tracked Since Feb 18, 2026