Upstream information

CVE-2026-43210 at MITRE

Description

In the Linux kernel, the following vulnerability has been resolved:

tracing: ring-buffer: Fix to check event length before using

Check the event length before adding it for accessing next index in
rb_read_data_buffer(). Since this function is used for validating
possibly broken ring buffers, the length of the event could be broken.
In that case, the new event (e + len) can point a wrong address.
To avoid invalid memory access at boot, check whether the length of
each event is in the possible range before using it.

SUSE information

Overall state of this security issue: Does not affect SUSE products

SUSE Bugzilla entry: 1264330 [NEW]

No SUSE Security Announcements cross referenced.


SUSE Timeline for this CVE

CVE page created: Wed May 6 16:01:41 2026
CVE page last modified: Fri May 8 12:09:00 2026