CVE-2026-43210
tracing: ring-buffer: Fix to check event length before using
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: tracing: ring-buffer: Fix to check event length before using Check the event length before adding it for accessing next index in rb_read_data_buffer(). Since this function is used for validating possibly broken ring buffers, the length of the event could be broken. In that case, the new event (e + len) can point a wrong address. To avoid invalid memory access at boot, check whether the length of each event is in the possible range before using it.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < b4700c089a10f89de3a5149d57f8a58306458982 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 5026010110a5ad2268d8c23e1e286ab7c736f7ac 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 9eb80e54494ef1efef8a64bec4ffa672c9cf411e 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 < 912b0ee248c529a4f45d1e7f568dc1adddbf2a4a
Linux / Linux
6.12
References
git.kernel.org: https://git.kernel.org/stable/c/b4700c089a10f89de3a5149d57f8a58306458982 git.kernel.org: https://git.kernel.org/stable/c/5026010110a5ad2268d8c23e1e286ab7c736f7ac git.kernel.org: https://git.kernel.org/stable/c/9eb80e54494ef1efef8a64bec4ffa672c9cf411e git.kernel.org: https://git.kernel.org/stable/c/912b0ee248c529a4f45d1e7f568dc1adddbf2a4a