๐Ÿ” CVE Alert

CVE-2026-43210

UNKNOWN 0.0

tracing: ring-buffer: Fix to check event length before using

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: tracing: ring-buffer: Fix to check event length before using Check the event length before adding it for accessing next index in rb_read_data_buffer(). Since this function is used for validating possibly broken ring buffers, the length of the event could be broken. In that case, the new event (e + len) can point a wrong address. To avoid invalid memory access at boot, check whether the length of each event is in the possible range before using it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < b4700c089a10f89de3a5149d57f8a58306458982 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 5026010110a5ad2268d8c23e1e286ab7c736f7ac 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 9eb80e54494ef1efef8a64bec4ffa672c9cf411e 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 912b0ee248c529a4f45d1e7f568dc1adddbf2a4a
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b4700c089a10f89de3a5149d57f8a58306458982 git.kernel.org: https://git.kernel.org/stable/c/5026010110a5ad2268d8c23e1e286ab7c736f7ac git.kernel.org: https://git.kernel.org/stable/c/9eb80e54494ef1efef8a64bec4ffa672c9cf411e git.kernel.org: https://git.kernel.org/stable/c/912b0ee248c529a4f45d1e7f568dc1adddbf2a4a