First published: Tue Nov 05 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character. This commit checks this condition and returns failure for it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.1<5.15.170 | |
Linux Kernel | >=5.16<6.1.115 | |
Linux Kernel | >=6.2<6.6.59 | |
Linux Kernel | >=6.7<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50131 has a high severity rating due to its potential impact on system stability and security.
CVE-2024-50131 affects multiple versions of the Linux kernel from 5.1 to 6.12-rc4.
To fix CVE-2024-50131, upgrade your Linux kernel to a version that is not affected, specifically higher than 6.12-rc4.
CVE-2024-50131 is considered potentially exploitable, which could lead to unauthorized access or denial of service.
Affected systems may experience unexpected behavior or crashes related to kernel tracing functions.