First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.33 | 6.6.33 |
redhat/kernel | <6.8.12 | 6.8.12 |
redhat/kernel | <6.9.3 | 6.9.3 |
redhat/kernel | <6.10 | 6.10 |
Linux Kernel | >=4.14<6.6.33 | |
Linux Kernel | >=6.7<6.8.12 | |
Linux Kernel | >=6.9<6.9.3 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.128-1 | 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38541 is classified as a medium severity vulnerability due to potential buffer overflow issues in the Linux kernel.
To fix CVE-2024-38541, update the Linux kernel to version 6.6.33 or later for Red Hat and 5.10.223-1 or 6.1.128-1 for Debian.
CVE-2024-38541 affects various versions of the Linux kernel primarily on Red Hat and Debian distributions.
CVE-2024-38541 is caused by a lack of proper buffer overflow checks in the of_modalias() function within the Linux kernel.
Currently, the recommended approach is to apply the necessary kernel updates as there are no known effective workarounds for CVE-2024-38541.