Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-31890
March 12, 2026
Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. Prior to 0.50.1, in a situation where the ring-buffer of a gadget is – incidentally or maliciously – already full, the gadget will silently drop events. The include/gadget/buffer.h file contains definitions for the Buffer API that gadgets can use to, among the other things, transfer data from eBPF programs to userspace. For hosts running a modern enough Linux kernel (>= 5.8), this transfer mechanism is based on ring-buffers. The size of the ring-buffer for the gadgets is hard-coded to 256KB. When a gadget_reserve_buf fails because of insufficient space, the gadget silently cleans up without producing an alert. The lost count reported by the eBPF operator, when using ring-buffers – the modern choice – is hardcoded to zero. The vulnerability can be used by a malicious event source (e.g. a compromised container) to cause a Denial Of Service, forcing the system to drop events coming from other containers (or the same container). This vulnerability is fixed in 0.50.1.
Affected Packages
https://github.com/inspektor-gadget/inspektor-gadget.git (GITHUB):
Affected version(s) =v0.50.0 <v0.50.1
Fix Suggestion:
Update to version v0.50.1
github.com/inspektor-gadget/inspektor-gadget (GO):
Affected version(s) >=v0.1.0 <v0.50.1-0.20260310153156-30a271999e24
Fix Suggestion:
Update to version v0.50.1-0.20260310153156-30a271999e24
github.com/inspektor-gadget/inspektor-gadget (GO):
Affected version(s) >=v0.0.0-20230208125051-e348150b4782 <v0.0.0-20260310130728-96831ebb398e
Fix Suggestion:
Update to version v0.0.0-20260310130728-96831ebb398e
Do you need more information?
Contact Us
CVSS v4
Base Score:
4.8
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.4
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
Omission of Security-relevant Information
EPSS
Base Score:
0.02