๐Ÿ” CVE Alert

CVE-2024-43890

UNKNOWN 0.0

tracing: Fix overflow in get_free_elt()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix overflow in get_free_elt() "tracing_map->next_elt" in get_free_elt() is at risk of overflowing. Once it overflows, new elements can still be inserted into the tracing_map even though the maximum number of elements (`max_elts`) has been reached. Continuing to insert elements after the overflow could result in the tracing_map containing "tracing_map->max_size" elements, leaving no empty entries. If any attempt is made to insert an element into a full tracing_map using `__tracing_map_insert()`, it will cause an infinite loop with preemption disabled, leading to a CPU hang problem. Fix this by preventing any further increments to "tracing_map->next_elt" once it reaches "tracing_map->max_elt".

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 26, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
08d43a5fa063e03c860f2f391a30c388bcbc948e < 302ceb625d7b990db205a15e371f9a71238de91c 08d43a5fa063e03c860f2f391a30c388bcbc948e < d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18 08d43a5fa063e03c860f2f391a30c388bcbc948e < eb223bf01e688dfe37e813c8988ee11c8c9f8d0a 08d43a5fa063e03c860f2f391a30c388bcbc948e < cd10d186a5409a1fe6e976df82858e9773a698da 08d43a5fa063e03c860f2f391a30c388bcbc948e < 788ea62499b3c18541fd6d621964d8fafbc4aec5 08d43a5fa063e03c860f2f391a30c388bcbc948e < a172c7b22bc2feaf489cfc6d6865f7237134fdf8 08d43a5fa063e03c860f2f391a30c388bcbc948e < 236bb4690773ab6869b40bedc7bc8d889e36f9d6 08d43a5fa063e03c860f2f391a30c388bcbc948e < bcf86c01ca4676316557dd482c8416ece8c2e143
Linux / Linux
4.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c git.kernel.org: https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18 git.kernel.org: https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a git.kernel.org: https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da git.kernel.org: https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5 git.kernel.org: https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8 git.kernel.org: https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6 git.kernel.org: https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-613116.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html