CVE-2024-38541

Updated: 2025-08-20 03:16:36.381747

Description:

In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x MEDIUM 4.4

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 4.4 MEDIUM Ignored 2025-09-10 21:44:14 This flaw is a local-only bug in the Device Tree (OF) modalias helper of_modalias and requires an al...
CentOS 8.4 ELS kernel 4.18.0 4.4 MEDIUM Ignored 2025-02-26 07:18:10 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 4.4 MEDIUM Ignored 2025-02-26 11:48:15 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 4.4 MEDIUM Ignored 2025-02-26 07:18:15 Ignored due to low severity
Oracle Linux 7 ELS kernel-uek 5.4.17 4.4 MEDIUM Released CLSA-2025:1757963029 2025-09-16 11:21:15
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.4 MEDIUM Released CLSA-2025:1757965001 2025-09-16 00:51:58 Ignored due to low severity
Ubuntu 16.04 ELS linux 4.4.0 4.4 MEDIUM Ignored 2025-08-08 01:58:16 Ignored due to low severity
Ubuntu 18.04 ELS linux 4.15.0 4.4 MEDIUM Released CLSA-2025:1758010922 2025-09-16 11:31:50 Ignored due to low severity
Ubuntu 20.04 ELS linux 5.4.0 4.4 MEDIUM Released CLSA-2025:1758019011 2025-09-16 22:30:29