VYPR
High severity7.8NVD Advisory· Published Nov 5, 2024· Updated May 12, 2026

CVE-2024-50131

CVE-2024-50131

Description

In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length

strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.

This commit checks this condition and returns failure for it.

Affected products

1
  • Linux/Linuxv5
    Range: 5.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.