๐Ÿ” CVE Alert

CVE-2024-50132

MEDIUM 5.5

tracing/probes: Fix MAX_TRACE_ARGS limit handling

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: tracing/probes: Fix MAX_TRACE_ARGS limit handling When creating a trace_probe we would set nr_args prior to truncating the arguments to MAX_TRACE_ARGS. However, we would only initialize arguments up to the limit. This caused invalid memory access when attempting to set up probes with more than 128 fetchargs. BUG: kernel NULL pointer dereference, address: 0000000000000020 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI CPU: 0 UID: 0 PID: 1769 Comm: cat Not tainted 6.11.0-rc7+ #8 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014 RIP: 0010:__set_print_fmt+0x134/0x330 Resolve the issue by applying the MAX_TRACE_ARGS limit earlier. Return an error when there are too many arguments instead of silently truncating.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e96b42d22f66982b84e31b6935a59d74d9a2d848 < 6bc24db74fe4788cc7c2f30a113fc6aafba225a3 035ba76014c096316fa809a46ce0a1b9af1cde0d < 08ccd1a57c4d3882e9a877eb2dcc66e50a3b0279 035ba76014c096316fa809a46ce0a1b9af1cde0d < 73f35080477e893aa6f4c8d388352b871b288fbc
Linux / Linux
6.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6bc24db74fe4788cc7c2f30a113fc6aafba225a3 git.kernel.org: https://git.kernel.org/stable/c/08ccd1a57c4d3882e9a877eb2dcc66e50a3b0279 git.kernel.org: https://git.kernel.org/stable/c/73f35080477e893aa6f4c8d388352b871b288fbc