CVE-2024-50131

Source
https://cve.org/CVERecord?id=CVE-2024-50131
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50131.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50131
Downstream
Related
Published
2024-11-05T17:10:56.981Z
Modified
2026-03-20T12:38:13.727529Z
Summary
tracing: Consider the NULL character when validating the event length
Details

In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length

strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.

This commit checks this condition and returns failure for it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50131.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dec65d79fd269d05427c8167090bfc9c3d0b56c4
Fixed
5e3231b352725ff4a3a0095e6035af674f2d8725
Fixed
02874ca52df2ca2423ba6122039315ed61c25972
Fixed
b86b0d6eea204116e4185acc35041ca4ff11a642
Fixed
f4ed40d1c669bba1a54407d8182acdc405683f29
Fixed
a14a075a14af8d622c576145455702591bdde09d
Fixed
5fd942598ddeed9a212d1ff41f9f5b47bcc990a7
Fixed
0b6e2e22cb23105fcb171ab92f0f7516c69c8471

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50131.json"