Description
Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. Prior to 0.50.1, in a situation where the ring-buffer of a gadget is – incidentally or maliciously – already full, the gadget will silently drop events. The include/gadget/buffer.h file contains definitions for the Buffer API that gadgets can use to, among the other things, transfer data from eBPF programs to userspace. For hosts running a modern enough Linux kernel (>= 5.8), this transfer mechanism is based on ring-buffers. The size of the ring-buffer for the gadgets is hard-coded to 256KB. When a gadget_reserve_buf fails because of insufficient space, the gadget silently cleans up without producing an alert. The lost count reported by the eBPF operator, when using ring-buffers – the modern choice – is hardcoded to zero. The vulnerability can be used by a malicious event source (e.g. a compromised container) to cause a Denial Of Service, forcing the system to drop events coming from other containers (or the same container). This vulnerability is fixed in 0.50.1.
Published: 2026-03-12
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Inspektor Gadget is a collection of tools that leverages eBPF to collect data from Kubernetes clusters and Linux hosts. Prior to release 0.50.1, the tracing gadgets use a fixed 256 KB ring‑buffer to transport events from eBPF programs to user space. When the buffer is already full, the kernel ring‑buffer reservation fails and the gadget silently discards the event, resetting the lost‑event counter to zero. This behavior allows an attacker who can inject a large number of events—such as from a compromised container—to flood the ring‑buffer and cause the gadget to drop all subsequently generated events. The failure to surface loss causes operators to be unaware of the denial, effectively disabling observability (CWE‑223: Improper Error Handling, CWE‑770: Buffer Overflow).

Affected Systems

The affected product is Inspektor Gadget (linuxfoundation:inspektor_gadget) running on Kubernetes clusters or Linux hosts that use a kernel version 5.8 or newer. All releases before 0.50.1 are vulnerable; no specific sub‑versions are enumerated in the advisory. The vulnerability originates in the buffer.h implementation that all supported gadgets use.

Risk and Exploitability

CVSS 4.8 indicates moderate severity, and the EPSS score of less than 1 % shows a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Successful exploitation requires an attacker to be able to generate a flood of eBPF events from within the cluster—typically via a compromised container or untrusted pod—providing local access to the host where the gadget runs. Attackers could then suppress monitoring and debugging output, potentially masking malicious activity.

Generated by OpenCVE AI on March 17, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Inspektor Gadget to version 0.50.1 or later

Generated by OpenCVE AI on March 17, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation inspektor Gadget
CPEs cpe:2.3:a:linuxfoundation:inspektor_gadget:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation inspektor Gadget
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Inspektor-gadget
Inspektor-gadget inspektor-gadget
Vendors & Products Inspektor-gadget
Inspektor-gadget inspektor-gadget

Thu, 12 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. Prior to 0.50.1, in a situation where the ring-buffer of a gadget is – incidentally or maliciously – already full, the gadget will silently drop events. The include/gadget/buffer.h file contains definitions for the Buffer API that gadgets can use to, among the other things, transfer data from eBPF programs to userspace. For hosts running a modern enough Linux kernel (>= 5.8), this transfer mechanism is based on ring-buffers. The size of the ring-buffer for the gadgets is hard-coded to 256KB. When a gadget_reserve_buf fails because of insufficient space, the gadget silently cleans up without producing an alert. The lost count reported by the eBPF operator, when using ring-buffers – the modern choice – is hardcoded to zero. The vulnerability can be used by a malicious event source (e.g. a compromised container) to cause a Denial Of Service, forcing the system to drop events coming from other containers (or the same container). This vulnerability is fixed in 0.50.1.
Title Inspektor Gadget: Tracing Denial of Service via Event Flooding
Weaknesses CWE-223
CWE-770
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Inspektor-gadget Inspektor-gadget
Linuxfoundation Inspektor Gadget
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:25:05.936Z

Reserved: 2026-03-09T21:59:02.687Z

Link: CVE-2026-31890

cve-icon Vulnrichment

Updated: 2026-03-13T16:24:52.988Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T18:16:24.573

Modified: 2026-03-16T17:54:39.960

Link: CVE-2026-31890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:43Z

Weaknesses