#VU124448 Out-of-bounds read in Linux kernel - CVE-2026-23390
Published: March 25, 2026
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in the dma_map_sg tracepoint when handling large scatter-gather lists. A local user can trigger the tracepoint with a large scatter-gather list to cause a perf buffer overflow, resulting in a denial of service.
The tracepoint is used during DMA mapping operations and can be triggered when tracing is enabled. The buffer overflow occurs because the size of the trace data exceeds the maximum allowed size in the perf buffer, leading to a kernel warning and potential system instability.