Bug 2436768 (CVE-2026-23069) - CVE-2026-23069 kernel: vsock/virtio: fix potential underflow in virtio_transport_get_credit()
Summary: CVE-2026-23069 kernel: vsock/virtio: fix potential underflow in virtio_transp...
Keywords:
Status: NEW
Alias: CVE-2026-23069
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-04 17:02 UTC by OSIDB Bzimport
Modified: 2026-02-25 09:24 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-04 17:02:26 UTC
In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: fix potential underflow in virtio_transport_get_credit()

The credit calculation in virtio_transport_get_credit() uses unsigned
arithmetic:

  ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_fwd_cnt);

If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes
are in flight, the subtraction can underflow and produce a large
positive value, potentially allowing more data to be queued than the
peer can handle.

Reuse virtio_transport_has_space() which already handles this case and
add a comment to make it clear why we are doing that.

[Stefano: use virtio_transport_has_space() instead of duplicating the code]
[Stefano: tweak the commit message]

Comment 6 Phoenix99 2026-02-25 09:24:49 UTC
(In reply to Jon Moroney from comment #1)
> Upstream advisory:
> https://lore.kernel.org/linux-cve-announce/2026020417-CVE-2026-23069-d026@gregkh/T https://cowboysafarigame.com/

Thanks for linking the upstream advisory and updating the classification. The medium severity rating seems appropriate given the potential for credit miscalculation and excessive queueing.


Note You need to log in before you can comment on or make changes to this bug.