In the Linux kernel, the following vulnerability has been resolved:
net: netconsole: fix wrong warning
A warning is triggered when there is insufficient space in the buffer
for userdata. However, this is not an issue since userdata will be sent
in the next iteration.
Current warning message:
------------[ cut here ]------------
WARNING: CPU: 13 PID: 3013042 at drivers/net/netconsole.c:1122 write_ext_msg+0x3b6/0x3d0
? write_ext_msg+0x3b6/0x3d0
console_flush_all+0x1e9/0x330
The code incorrectly issues a warning when this_chunk is zero, which is
a valid scenario. The warning should only be triggered when this_chunk
is negative.
References
Configurations
Configuration 1 (hide)
|
History
13 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/712a3af3710263444217df54e7f337f99df198d2 - Patch | |
References | () https://git.kernel.org/stable/c/d94785bb46b6167382b1de3290eccc91fa98df53 - Patch |
06 Nov 2024, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 17:15
Updated : 2024-11-13 00:40
NVD link : CVE-2024-50092
Mitre link : CVE-2024-50092
CVE.ORG link : CVE-2024-50092
JSON object : View
Products Affected
linux
- linux_kernel
CWE