Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-57930
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Jan, 2025 | 12:01
Updated At-03 Nov, 2025 | 20:55
Rejected At-
▼CVE Numbering Authority (CNA)
tracing: Have process_string() also allow arrays

In the Linux kernel, the following vulnerability has been resolved: tracing: Have process_string() also allow arrays In order to catch a common bug where a TRACE_EVENT() TP_fast_assign() assigns an address of an allocated string to the ring buffer and then references it in TP_printk(), which can be executed hours later when the string is free, the function test_event_printk() runs on all events as they are registered to make sure there's no unwanted dereferencing. It calls process_string() to handle cases in TP_printk() format that has "%s". It returns whether or not the string is safe. But it can have some false positives. For instance, xe_bo_move() has: TP_printk("move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s", __entry->move_lacks_source ? "yes" : "no", __entry->bo, __entry->size, xe_mem_type_to_name[__entry->old_placement], xe_mem_type_to_name[__entry->new_placement], __get_str(device_id)) Where the "%s" references into xe_mem_type_to_name[]. This is an array of pointers that should be safe for the event to access. Instead of flagging this as a bad reference, if a reference points to an array, where the record field is the index, consider it safe.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/trace/trace_events.c
Default Status
unaffected
Versions
Affected
  • From 85d7635d54d75a2589f28583dc17feedc3aa4ad6 before 3bcdc9039a6e9e6e47ed689a37b8d57894a3c571 (git)
  • From f3ff759ec636b4094b8eb2c3801e4e6c97a6b712 before 631b1e09e213c86d5a4ce23d45c81af473bb0ac7 (git)
  • From 2f6ad0b613cd45cca48e6eb04f65351db018afb0 before a64e5295ebc4afdefe69cdf16cc286a60ff8ba4b (git)
  • From 683eccacc02d2eb25d1c34b8fb0363fcc7e08f64 before 92bd18c74624e5eb9f96e70076aa46293f4b626f (git)
  • From 65a25d9f7ac02e0cf361356e834d1c71d36acca9 before afc6717628f959941d7b33728570568b4af1c4b8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/trace/trace_events.c
Default Status
unaffected
Versions
Affected
  • From 6.1.122 before 6.1.124 (semver)
  • From 6.6.68 before 6.6.70 (semver)
  • From 6.12.7 before 6.12.9 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/3bcdc9039a6e9e6e47ed689a37b8d57894a3c571
N/A
https://git.kernel.org/stable/c/631b1e09e213c86d5a4ce23d45c81af473bb0ac7
N/A
https://git.kernel.org/stable/c/a64e5295ebc4afdefe69cdf16cc286a60ff8ba4b
N/A
https://git.kernel.org/stable/c/92bd18c74624e5eb9f96e70076aa46293f4b626f
N/A
https://git.kernel.org/stable/c/afc6717628f959941d7b33728570568b4af1c4b8
N/A
Hyperlink: https://git.kernel.org/stable/c/3bcdc9039a6e9e6e47ed689a37b8d57894a3c571
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/631b1e09e213c86d5a4ce23d45c81af473bb0ac7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a64e5295ebc4afdefe69cdf16cc286a60ff8ba4b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/92bd18c74624e5eb9f96e70076aa46293f4b626f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/afc6717628f959941d7b33728570568b4af1c4b8
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Details not found