High severity7.8NVD Advisory· Published Nov 5, 2024· Updated May 12, 2026
CVE-2024-50131
CVE-2024-50131
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Consider the NULL character when validating the event length
strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.
This commit checks this condition and returns failure for it.
Affected products
1- Linux/Linuxv5Range: 5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.