CVE-2026-43210
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
11/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tracing: ring-buffer: Fix to check event length before using<br />
<br />
Check the event length before adding it for accessing next index in<br />
rb_read_data_buffer(). Since this function is used for validating<br />
possibly broken ring buffers, the length of the event could be broken.<br />
In that case, the new event (e + len) can point a wrong address.<br />
To avoid invalid memory access at boot, check whether the length of<br />
each event is in the possible range before using it.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



