CVE-2026-43210
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tracing: ring-buffer: Fix to check event length before using<br />
<br />
Check the event length before adding it for accessing next index in<br />
rb_read_data_buffer(). Since this function is used for validating<br />
possibly broken ring buffers, the length of the event could be broken.<br />
In that case, the new event (e + len) can point a wrong address.<br />
To avoid invalid memory access at boot, check whether the length of<br />
each event is in the possible range before using it.



