In the Linux kernel, the following vulnerability has been resolved:
tracing: Consider the NULL character when validating the event length
strlen() returns a string length excluding the null byte. If the string length equals to the maximum buffer length, the buffer will have no space for the NULL terminating character.
This commit checks this condition and returns failure for it.
[
{
"id": "CVE-2024-50131-0f93e77a",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"212888046766797240378155386968103027301",
"302713759530948400516589100330844522850",
"171393383988107216737338743728992327234",
"252308338759113101426214285034237981367"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b6e2e22cb23105fcb171ab92f0f7516c69c8471",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-117ef8c6",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"212888046766797240378155386968103027301",
"302713759530948400516589100330844522850",
"171393383988107216737338743728992327234",
"252308338759113101426214285034237981367"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ed40d1c669bba1a54407d8182acdc405683f29",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-6d54d0a1",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"212888046766797240378155386968103027301",
"302713759530948400516589100330844522850",
"171393383988107216737338743728992327234",
"252308338759113101426214285034237981367"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a14a075a14af8d622c576145455702591bdde09d",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-7d484ba7",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"55062661283342081272937571303004471027",
"302713759530948400516589100330844522850",
"171393383988107216737338743728992327234",
"252308338759113101426214285034237981367"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b86b0d6eea204116e4185acc35041ca4ff11a642",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-93bb0c0a",
"target": {
"file": "kernel/trace/trace_probe.c",
"function": "traceprobe_parse_event_name"
},
"digest": {
"length": 921.0,
"function_hash": "168903439630188646924147936506738954053"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b86b0d6eea204116e4185acc35041ca4ff11a642",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-b83a41b2",
"target": {
"file": "kernel/trace/trace_probe.c",
"function": "traceprobe_parse_event_name"
},
"digest": {
"length": 964.0,
"function_hash": "286473019625862691597795097730128448055"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ed40d1c669bba1a54407d8182acdc405683f29",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-bb66f062",
"target": {
"file": "kernel/trace/trace_probe.c",
"function": "traceprobe_parse_event_name"
},
"digest": {
"length": 964.0,
"function_hash": "286473019625862691597795097730128448055"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0b6e2e22cb23105fcb171ab92f0f7516c69c8471",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-bd6024dd",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"55062661283342081272937571303004471027",
"302713759530948400516589100330844522850",
"171393383988107216737338743728992327234",
"252308338759113101426214285034237981367"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e3231b352725ff4a3a0095e6035af674f2d8725",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-c753ee7a",
"target": {
"file": "kernel/trace/trace_probe.c",
"function": "traceprobe_parse_event_name"
},
"digest": {
"length": 964.0,
"function_hash": "286473019625862691597795097730128448055"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a14a075a14af8d622c576145455702591bdde09d",
"signature_version": "v1"
},
{
"id": "CVE-2024-50131-de80119b",
"target": {
"file": "kernel/trace/trace_probe.c",
"function": "traceprobe_parse_event_name"
},
"digest": {
"length": 877.0,
"function_hash": "278647435617233079532602901685529213504"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e3231b352725ff4a3a0095e6035af674f2d8725",
"signature_version": "v1"
}
]