CVE-2024-50092

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50092
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50092.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50092
Downstream
Related
Published
2024-11-05T17:15:06Z
Modified
2025-08-09T19:01:27Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

net: netconsole: fix wrong warning

A warning is triggered when there is insufficient space in the buffer for userdata. However, this is not an issue since userdata will be sent in the next iteration.

Current warning message:

------------[ cut here ]------------
 WARNING: CPU: 13 PID: 3013042 at drivers/net/netconsole.c:1122 write_ext_msg+0x3b6/0x3d0
  ? write_ext_msg+0x3b6/0x3d0
  console_flush_all+0x1e9/0x330

The code incorrectly issues a warning when thischunk is zero, which is a valid scenario. The warning should only be triggered when thischunk is negative.

References

Affected packages