CVE-2026-43210

high

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: ring-buffer: Fix to check event length before using Check the event length before adding it for accessing next index in rb_read_data_buffer(). Since this function is used for validating possibly broken ring buffers, the length of the event could be broken. In that case, the new event (e + len) can point a wrong address. To avoid invalid memory access at boot, check whether the length of each event is in the possible range before using it.

References

https://git.kernel.org/stable/c/b4700c089a10f89de3a5149d57f8a58306458982

https://git.kernel.org/stable/c/9eb80e54494ef1efef8a64bec4ffa672c9cf411e

https://git.kernel.org/stable/c/912b0ee248c529a4f45d1e7f568dc1adddbf2a4a

https://git.kernel.org/stable/c/5026010110a5ad2268d8c23e1e286ab7c736f7ac

Details

Source: Mitre, NVD

Published: 2026-05-06

Updated: 2026-05-06

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00018