Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-38541
HistoryJun 19, 2024 - 12:00 a.m.

CVE-2024-38541

2024-06-1900:00:00
ubuntu.com
ubuntu.com
7
linux kernel
vulnerability
buffer overflow
fix
of_modalias
snprintf
strlen

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

In the Linux kernel, the following vulnerability has been resolved: of:
module: add buffer overflow check in of_modalias() In of_modalias(), if the
buffer happens to be too small even for the 1st snprintf() call, the len
parameter will become negative and str parameter (if not NULL initially)
will point beyond the buffer’s end. Add the buffer overflow check after the
1st snprintf() call and fix such check after the strlen() call (accounting
for the terminating NUL char).

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High