SB2026032554 - Out-of-bounds read in Linux kernel trace events
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2026-23390)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in the dma_map_sg tracepoint when handling large scatter-gather lists. A local user can trigger the tracepoint with a large scatter-gather list to cause a perf buffer overflow, resulting in a denial of service.
The tracepoint is used during DMA mapping operations and can be triggered when tracing is enabled. The buffer overflow occurs because the size of the trace data exceeds the maximum allowed size in the perf buffer, leading to a kernel warning and potential system instability.
Remediation
Install update from vendor's website.