Buffer Overflow in Linux Kernel Due to DMA Mapping Mechanism
CVE-2026-23390
What is CVE-2026-23390?
A vulnerability exists in the Linux kernel's handling of DMA mapping tracepoints, specifically related to the dma_map_sg function. This issue can lead to a buffer overflow when processing large scatter-gather lists, especially when interacting with devices like virtio-gpu that generate sizable DRM buffers. The tracepoint may attempt to allocate more memory than permitted, surpassing the defined maximum trace size and resulting in warnings related to insufficient buffer size. The implemented solution caps the dynamic arrays to a maximum of 128 entries, which prevents overflow while ensuring efficient memory usage.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Linux 038eb433dc1474c4bc7d33188294e3d4778efdfd < 02d209bb018a40dee9eac89e91860253dee9605b
Linux 038eb433dc1474c4bc7d33188294e3d4778efdfd
Linux 038eb433dc1474c4bc7d33188294e3d4778efdfd