Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43210
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-11 May, 2026 | 22:20
Rejected At-
▼CVE Numbering Authority (CNA)
tracing: ring-buffer: Fix to check event length before using

In the Linux kernel, the following vulnerability has been resolved: tracing: ring-buffer: Fix to check event length before using Check the event length before adding it for accessing next index in rb_read_data_buffer(). Since this function is used for validating possibly broken ring buffers, the length of the event could be broken. In that case, the new event (e + len) can point a wrong address. To avoid invalid memory access at boot, check whether the length of each event is in the possible range before using it.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/trace/ring_buffer.c
Default Status
unaffected
Versions
Affected
  • From 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 before b4700c089a10f89de3a5149d57f8a58306458982 (git)
  • From 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 before 5026010110a5ad2268d8c23e1e286ab7c736f7ac (git)
  • From 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 before 9eb80e54494ef1efef8a64bec4ffa672c9cf411e (git)
  • From 5f3b6e839f3ceb8d6ef02231ba9b5aca71b8bf55 before 912b0ee248c529a4f45d1e7f568dc1adddbf2a4a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/trace/ring_buffer.c
Default Status
affected
Versions
Affected
  • 6.12
Unaffected
  • From 0 before 6.12 (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b4700c089a10f89de3a5149d57f8a58306458982
N/A
https://git.kernel.org/stable/c/5026010110a5ad2268d8c23e1e286ab7c736f7ac
N/A
https://git.kernel.org/stable/c/9eb80e54494ef1efef8a64bec4ffa672c9cf411e
N/A
https://git.kernel.org/stable/c/912b0ee248c529a4f45d1e7f568dc1adddbf2a4a
N/A
Hyperlink: https://git.kernel.org/stable/c/b4700c089a10f89de3a5149d57f8a58306458982
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5026010110a5ad2268d8c23e1e286ab7c736f7ac
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9eb80e54494ef1efef8a64bec4ffa672c9cf411e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/912b0ee248c529a4f45d1e7f568dc1adddbf2a4a
Resource: N/A
Details not found