CVE-2024-50092

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50092
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50092.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50092
Downstream
Related
Published
2024-11-05T17:04:55Z
Modified
2025-10-09T20:56:43.063893Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
net: netconsole: fix wrong warning
Details

In the Linux kernel, the following vulnerability has been resolved:

net: netconsole: fix wrong warning

A warning is triggered when there is insufficient space in the buffer for userdata. However, this is not an issue since userdata will be sent in the next iteration.

Current warning message:

------------[ cut here ]------------
 WARNING: CPU: 13 PID: 3013042 at drivers/net/netconsole.c:1122 write_ext_msg+0x3b6/0x3d0
  ? write_ext_msg+0x3b6/0x3d0
  console_flush_all+0x1e9/0x330

The code incorrectly issues a warning when thischunk is zero, which is a valid scenario. The warning should only be triggered when thischunk is negative.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1ec9daf950936c2a1c591596e83c09ce2eb12ade
Fixed
712a3af3710263444217df54e7f337f99df198d2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1ec9daf950936c2a1c591596e83c09ce2eb12ade
Fixed
d94785bb46b6167382b1de3290eccc91fa98df53

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.12-rc1
v6.8
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.11.4