{"api_version":"1","generated_at":"2026-05-18T07:35:44+00:00","cve":"CVE-2024-50131","urls":{"html":"https://cve.report/CVE-2024-50131","api":"https://cve.report/api/cve/CVE-2024-50131.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-50131","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-50131"},"summary":{"title":"tracing: Consider the NULL character when validating the event length","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Consider the NULL character when validating the event length\n\nstrlen() returns a string length excluding the null byte. If the string\nlength equals to the maximum buffer length, the buffer will have no\nspace for the NULL terminating character.\n\nThis commit checks this condition and returns failure for it.","state":"PUBLISHED","assigner":"Linux","published_at":"2024-11-05 18:15:15","updated_at":"2026-05-12 13:16:17"},"problem_types":["CWE-120"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/0b6e2e22cb23105fcb171ab92f0f7516c69c8471","name":"https://git.kernel.org/stable/c/0b6e2e22cb23105fcb171ab92f0f7516c69c8471","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/b86b0d6eea204116e4185acc35041ca4ff11a642","name":"https://git.kernel.org/stable/c/b86b0d6eea204116e4185acc35041ca4ff11a642","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5e3231b352725ff4a3a0095e6035af674f2d8725","name":"https://git.kernel.org/stable/c/5e3231b352725ff4a3a0095e6035af674f2d8725","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","name":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/a14a075a14af8d622c576145455702591bdde09d","name":"https://git.kernel.org/stable/c/a14a075a14af8d622c576145455702591bdde09d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/02874ca52df2ca2423ba6122039315ed61c25972","name":"https://git.kernel.org/stable/c/02874ca52df2ca2423ba6122039315ed61c25972","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/f4ed40d1c669bba1a54407d8182acdc405683f29","name":"https://git.kernel.org/stable/c/f4ed40d1c669bba1a54407d8182acdc405683f29","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","name":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5fd942598ddeed9a212d1ff41f9f5b47bcc990a7","name":"https://git.kernel.org/stable/c/5fd942598ddeed9a212d1ff41f9f5b47bcc990a7","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-50131","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50131","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 5e3231b352725ff4a3a0095e6035af674f2d8725 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 02874ca52df2ca2423ba6122039315ed61c25972 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 b86b0d6eea204116e4185acc35041ca4ff11a642 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 f4ed40d1c669bba1a54407d8182acdc405683f29 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 a14a075a14af8d622c576145455702591bdde09d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 5fd942598ddeed9a212d1ff41f9f5b47bcc990a7 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected dec65d79fd269d05427c8167090bfc9c3d0b56c4 0b6e2e22cb23105fcb171ab92f0f7516c69c8471 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.1","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.1 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.4.285 5.4.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.229 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.170 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.115 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.59 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.11.6 6.11.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12 * original_commit_for_fix","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","version":"affected * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"50131","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-11-03T22:25:51.692Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T12:00:17.716Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["kernel/trace/trace_probe.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"5e3231b352725ff4a3a0095e6035af674f2d8725","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"02874ca52df2ca2423ba6122039315ed61c25972","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"b86b0d6eea204116e4185acc35041ca4ff11a642","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"f4ed40d1c669bba1a54407d8182acdc405683f29","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"a14a075a14af8d622c576145455702591bdde09d","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"5fd942598ddeed9a212d1ff41f9f5b47bcc990a7","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"},{"lessThan":"0b6e2e22cb23105fcb171ab92f0f7516c69c8471","status":"affected","version":"dec65d79fd269d05427c8167090bfc9c3d0b56c4","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["kernel/trace/trace_probe.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.1"},{"lessThan":"5.1","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.4.*","status":"unaffected","version":"5.4.285","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.229","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.170","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.115","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.59","versionType":"semver"},{"lessThanOrEqual":"6.11.*","status":"unaffected","version":"6.11.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.12","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.4.285","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.229","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.170","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.115","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.59","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.11.6","versionStartIncluding":"5.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12","versionStartIncluding":"5.1","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Consider the NULL character when validating the event length\n\nstrlen() returns a string length excluding the null byte. If the string\nlength equals to the maximum buffer length, the buffer will have no\nspace for the NULL terminating character.\n\nThis commit checks this condition and returns failure for it."}],"providerMetadata":{"dateUpdated":"2026-05-11T20:46:02.407Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/5e3231b352725ff4a3a0095e6035af674f2d8725"},{"url":"https://git.kernel.org/stable/c/02874ca52df2ca2423ba6122039315ed61c25972"},{"url":"https://git.kernel.org/stable/c/b86b0d6eea204116e4185acc35041ca4ff11a642"},{"url":"https://git.kernel.org/stable/c/f4ed40d1c669bba1a54407d8182acdc405683f29"},{"url":"https://git.kernel.org/stable/c/a14a075a14af8d622c576145455702591bdde09d"},{"url":"https://git.kernel.org/stable/c/5fd942598ddeed9a212d1ff41f9f5b47bcc990a7"},{"url":"https://git.kernel.org/stable/c/0b6e2e22cb23105fcb171ab92f0f7516c69c8471"}],"title":"tracing: Consider the NULL character when validating the event length","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2024-50131","datePublished":"2024-11-05T17:10:56.981Z","dateReserved":"2024-10-21T19:36:19.955Z","dateUpdated":"2026-05-12T12:00:17.716Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-11-05 18:15:15","lastModifiedDate":"2026-05-12 13:16:17","problem_types":["CWE-120"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.15.170","matchCriteriaId":"43F0C645-25E2-4977-90D1-68667F711484"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.115","matchCriteriaId":"C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.59","matchCriteriaId":"5D15CA59-D15C-4ACD-8B03-A072DEAD2081"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.11.6","matchCriteriaId":"E4486B12-007B-4794-9857-F07145637AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*","matchCriteriaId":"7F361E1D-580F-4A2D-A509-7615F73167A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*","matchCriteriaId":"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*","matchCriteriaId":"3C95E234-D335-4B6C-96BF-E2CEBD8654ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*","matchCriteriaId":"E0F717D8-3014-4F84-8086-0124B2111379"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"50131","Ordinal":"1","Title":"tracing: Consider the NULL character when validating the event l","CVE":"CVE-2024-50131","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"50131","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Consider the NULL character when validating the event length\n\nstrlen() returns a string length excluding the null byte. If the string\nlength equals to the maximum buffer length, the buffer will have no\nspace for the NULL terminating character.\n\nThis commit checks this condition and returns failure for it.","Type":"Description","Title":"tracing: Consider the NULL character when validating the event l"}]}}}