tracing: Consider the NULL character when validating the event length
Summary
| CVE | CVE-2024-50131 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-11-05 18:15:15 UTC |
| Updated | 2026-05-12 13:16:17 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character. This commit checks this condition and returns failure for it. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-120
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 5e3231b352725ff4a3a0095e6035af674f2d8725 git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 02874ca52df2ca2423ba6122039315ed61c25972 git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 b86b0d6eea204116e4185acc35041ca4ff11a642 git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 f4ed40d1c669bba1a54407d8182acdc405683f29 git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 a14a075a14af8d622c576145455702591bdde09d git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 5fd942598ddeed9a212d1ff41f9f5b47bcc990a7 git | Not specified |
| CNA | Linux | Linux | affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 0b6e2e22cb23105fcb171ab92f0f7516c69c8471 git | Not specified |
| CNA | Linux | Linux | affected 5.1 | Not specified |
| CNA | Linux | Linux | unaffected 5.1 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.4.285 5.4.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.229 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.170 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.115 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.59 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.11.6 6.11.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12 * original_commit_for_fix | Not specified |
| ADP | Siemens | SIMATIC S7-1500 TM MFP - GNU/Linux Subsystem | affected * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/0b6e2e22cb23105fcb171ab92f0f7516c69c8471 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/b86b0d6eea204116e4185acc35041ca4ff11a642 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/5e3231b352725ff4a3a0095e6035af674f2d8725 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| lists.debian.org/debian-lts-announce/2025/03/msg00002.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| git.kernel.org/stable/c/a14a075a14af8d622c576145455702591bdde09d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| cert-portal.siemens.com/productcert/html/ssa-265688.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/02874ca52df2ca2423ba6122039315ed61c25972 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/f4ed40d1c669bba1a54407d8182acdc405683f29 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/01/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| git.kernel.org/stable/c/5fd942598ddeed9a212d1ff41f9f5b47bcc990a7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.