CVE-2026-43210
Awaiting Analysis Awaiting Analysis - Queue
Linux Kernel Ring Buffer Length Validation Flaw

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: tracing: ring-buffer: Fix to check event length before using Check the event length before adding it for accessing next index in rb_read_data_buffer(). Since this function is used for validating possibly broken ring buffers, the length of the event could be broken. In that case, the new event (e + len) can point a wrong address. To avoid invalid memory access at boot, check whether the length of each event is in the possible range before using it.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-06
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's tracing ring-buffer functionality. Specifically, the issue is that the event length was not properly checked before being used in the function rb_read_data_buffer(). Because this function validates potentially broken ring buffers, an incorrect event length could cause the code to access an invalid memory address when calculating the next event's position.

The fix involves verifying that the length of each event is within a valid range before using it, which prevents invalid memory access during system boot.


How can this vulnerability impact me? :

If exploited, this vulnerability could lead to invalid memory access in the Linux kernel during boot time. This could potentially cause system instability, crashes, or unexpected behavior due to accessing incorrect memory locations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart